January 12, 2024
Via: The RegisterWelcome once more, dear reader, to On Call, The Register’s weekly reader-contributed column detailing the delights and dangers of working in tech support. This week, meet a reader we’ll Regomize as “Alvin” who regaled us with the tale of the […]
December 18, 2023
Via: Naked SecurityG2 just released their Winter 2024 Reports, and Sophos is the only cybersecurity provider named a Leader across the G2 Grid® Reports for Endpoint Protection Suites, Endpoint Detection and Response (EDR), Extended Detection and Response (XDR), Firewall Software ,and Managed […]
December 4, 2023
Via: Naked SecuritySophos DNS Protection is an exciting new web protection service now available for early access that will be provided at no extra charge to all Xstream Protection Sophos Firewall customers when it launches early next year. We need your help […]
September 14, 2023
Via: Help Net SecurityViavi Solutions announced the availability of NITRO AIOps on Google Cloud, creating an innovative solution that leverages VIAVI network analytics solutions and Google Cloud’s native service capabilities. The collaboration aims to address critical challenges faced by Communication Service Providers (CSPs) […]
February 15, 2023
Via: Help Net SecuritySynSaber has launched OT PCAP Analyzer tool that allows users to view a high-level breakdown of the device and protocol information contained within a packet capture (PCAP) file. SynSaber’s OT PCAP Analyzer provides visibility into a snapshot of your network […]
April 20, 2022
Via: Nakisani JacobsToday’s businesses, regardless of size, are vulnerable to hacking and data theft, which can result in significant financial loss. A virtual private network (VPN) uses advanced technology to protect your business data and keep you safe from online threats. A […]
July 23, 2021
Via: Help Net SecurityIn response to the 62% global increase in ransomware since 2019 (158% increase in North America) and over 40% of manufacturing firms suffering a cyberattack last year, Onclave Networks recommends manufacturers adopt zero trust architecture and security guidelines as supported […]
July 20, 2021
Via: Help Net SecurityZscaler released a study examining the state of IoT devices left on corporate networks during a time when businesses were forced to move to a remote working environment. The report analyzed over 575 million device transactions and 300,000 IoT-specific malware […]
July 2, 2021
Via: Help Net SecurityThere’s a major gap in security capability among mobile operators, which in many cases is not yet being filled by industry partnerships, Trend Micro reveals. In the 5G era, and a rapidly changing digital landscape, operators could broaden their security […]
February 22, 2021
Via: Dark ReadingRansomware continues to plague IT security teams as attackers rework their campaigns to be more subtle, more effective, and much more expensive for the organizations they hit. Security experts predict the pace of ransomware attacks will accelerate this year as […]
Mobile, Network security, Privacy protection, Security
September 4, 2020
Via: Help Net SecurityThere are clear benefits of 5G SIM capabilities to protect the most prominent personal data involved in mobile communications, according to the Trusted Connectivity Alliance. Addressing privacy risks The IMSI, known as a Subscription Permanent Identifier (SUPI) in 5G, is […]
Threats & Malware, Virus & Malware
August 6, 2020
Via: Help Net SecurityCommodity malware campaigns utilizing machine identities are increasing rapidly, according to threat analysis from Venafi. For example, malware attacks using machine identities doubled from 2018 to 2019, including high-profile campaigns such as: TrickBot, Skidmap, Kerberods and CryptoSink. Researchers gathered data […]
Threats & Malware, Virus & Malware
August 5, 2020
Via: Computer WeeklyA further increase in cyber attacks exploiting the Covid-19 coronavirus pandemic is highly likely in the near future, especially if there is substantial progress towards a vaccine, according to Interpol. The organisation said that should a vaccine become available, it […]
Cyber-crime, Phishing, Threats & Malware, Virus & Malware
August 4, 2020
Via: Security IntelligenceA ransomware infection can have a significant financial impact on an organization. American digital security and data backup firm Datto found that ransomware is costing businesses more than $75 billion a year. Part of that financial impact results from downtime […]
July 15, 2020
Via: Security IntelligenceIBM X-Force has reported a huge increase in COVID-19-related spam. Malicious domains have also rapidly expanded during the first quarter of 2020. Focus on Security Fundamentals One of the key fundamental approaches for security is to ensure your security team […]
Threats & Malware, Vulnerabilities
May 6, 2020
Via: Security WeekAs IT infrastructures have become more complex, certain specialist functions have developed their own niche requirements connected to but separate from mainstream IT operations. Prime examples would include development, security and network. Over the years, these niche requirements have become […]
Access control, Network security, Security
February 18, 2020
Via: Computer WeeklyIt is widely recognised that the traditional boundary protection approach to security is broken, particularly in the era of cloud services and remote working, where it is no longer possible to identify your perimeter, or trust those who purport to […]
February 14, 2020
Via: Security IntelligenceAfter 20 years of prominence, distributed denial-of-service (DDoS) attacks may be causing more devastating effects than ever. The first DDoS attack occurred way back on July 22, 1999 when a network of 114 computers infected with a malicious script called […]
February 7, 2020
Via: Computer WeeklyControlling the network perimeter security of traditional organisations, focused on protecting the infrastructure rather than the data, and with limited mobile and remote access, has never been a trivial task. Yet modern trends of workforce decentralisation and mobile access, reliance […]
January 31, 2020
Via: Help Net SecurityEU Member States have identified risks and vulnerabilities at national level and published a joint EU risk assessment. Through the toolbox, the Member States are committing to move forward in a joint manner based on an objective assessment of identified […]