Securing Critical Infrastructure: It’s Complicated
In his testimony before the U.S. House Committee on Homeland Security on April 5, Amit Yoran, Tenable’s chairman and CEO, highlighted real-world challenges and offered...
Borat Expands RAT Capabilities
New Remote Access Trojan that provides ransomware services to threat actors is no laughing matter Read More
Teleport bridges human and machine access management with Machine ID
Teleport, an open-source platform designed to provide zero trust access management for servers and cloud applications, has announced the availability of Teleport 9, the latest...
The Works hit by hackers, UK retailer shuts some stores after problems with payment tills
UK high street retailer The Works has shut some of its stores following a "cyber security incident" which saw hackers gain unauthorised access to its...
Cato Networks introduces device context-driven access control to tackle remote working and BYOD risks
SASE platform provider Cato Networks has introduced a new risk-based application access control for combatting security threats and productivity challenges posed by remote working and...
Hackers Using Fake Police Data Requests against Tech Companies
Brian Krebs has a detailed post about hackers using fake police data requests to trick companies into handing over data. Virtually all major technology companies...
Cyber threats increasingly target video games – The metaverse is next
Photo by Adi Goldstein on Unsplash This blog was written by an independent guest blogger. The technical infrastructure of video games requires a significant level of access to...
Retailer The Works Closes Stores After Cyber-Attack
Suspected ransomware to blame but no card details taken Read More
Global APT Groups Use Ukraine War for Phishing Lures
Cyber-espionage campaigns make the most of big news event Read More
WhatsApp ‘Voice Message’ Is an Info-Stealing Phishing Attack
Armorblox warns of new campaign using Russian domain Read More