Network Security

HPE Boosts Aruba, GreenLake Security with Zero Trust and AI
Infrastructure & Network Security HPE Boosts Aruba, GreenLake Security with Zero Trust and AI

Hewlett Packard Enterprise (HPE) recently made notable strides at the RSAC Conference, spotlighting vital upgrades to Aruba Networking and GreenLake platforms' security features. These advancements aim to bolster network defenses and include critical integrations of Zero Trust and AI technologies.

How Is Malwarebytes Tackling the Surge in Cybercrime?
Infrastructure & Network Security How Is Malwarebytes Tackling the Surge in Cybercrime?

Rupert Marais, an in-house Security Specialist, brings a wealth of knowledge in endpoint and device security, cybersecurity strategies, and network management. In our discussion, he sheds light on how Malwarebytes is tackling online fraud and enhancing cybersecurity for organizations worldwide

How Can Businesses Battle Ever-Evolving Cyber Threats?
Malware & Threats How Can Businesses Battle Ever-Evolving Cyber Threats?

In a world where digital transformation drives innovation and operational efficiency, businesses increasingly find themselves contending with a broad spectrum of rapidly evolving cyber threats. The pace at which these threats develop and infiltrate systems poses significant challenges, making it

Evolving Email Threats: AI and Encryption in 2025 Cyber Defense
Infrastructure & Network Security Evolving Email Threats: AI and Encryption in 2025 Cyber Defense

In the constantly shifting landscape of digital communication, email security has become a frontline concern, especially as cyber threats grow more complex. The year 2025 marks a significant period wherein advancements in technology have considerably altered the dynamics of cybersecurity. The

Synology DSM Vulnerability Lets Hackers Read Any File Remotely
Infrastructure & Network Security Synology DSM Vulnerability Lets Hackers Read Any File Remotely

A severe security vulnerability has been identified in Synology’s DiskStation Manager (DSM) software, alarming organizations and individuals who rely on the popular network-attached storage (NAS) solution. This vulnerability enables remote attackers to read arbitrary files through the Network File

How Are Attackers Using Docker for Novel Cryptojacking?
Infrastructure & Network Security How Are Attackers Using Docker for Novel Cryptojacking?

Out of all the services targeted by Darktrace, Docker has emerged as the most frequently attacked platform, showcasing an ongoing evolution in cyber threats with new malware strains appearing daily. This article will delve into a distinct malware attack featuring a unique obfuscation method and an

Loading

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later