News

  • Understanding the Ransomware Ecosystem: From Screen Lockers to Multimillion-Dollar Criminal Enterprise

    PRIVACY PRIVACY A new report from Tenable Research explores the key players in the ransomware ecosystem and the tactics that have helped propel it from a fledgling cyberthreat into a force to be reckoned with. Ransomware is a constantly evolving cyberthreat, and it is through its evolution that ransomware has managed to not only survive,…

    Read More

  • #Infosec22: Lessons Learned from Career on the Security Front Line

    PRIVACY PRIVACY Developments in technology are making it harder for security services to gather intelligence or detect espionage, according to a former head of MI5 Read More

    Read More

  • Symbiote Backdoor in Linux

    PRIVACY PRIVACY Interesting: What makes Symbiote different from other Linux malware that we usually come across, is that it needs to infect other running processes to inflict damage on infected machines. Instead of being a standalone executable file that is run to infect a machine, it is a shared object (SO) library that is loaded…

    Read More

  • Identity-Related Breaches Hit 84% of US Firms in 2021

    PRIVACY PRIVACY Cloud adoption driving volume of corporate credentials Read More

    Read More

  • How to Set Up a VPN

    PRIVACY PRIVACY In today’s connected world, you can do so much on the internet. It’s never been easier to stay entertained (Netflix, anyone?), informed, and productive. But it’s important to keep your online activities private and safe, whether you’re checking social media, using a streaming service, or banking online.   With the right solutions, you can…

    Read More

  • How the Secure Software Factory Reference Architecture protects the software supply chain

    PRIVACY PRIVACY The term “factory” related to software production might seem bizarre. Most still associate it with the collection, manipulation and manufacturing of hard materials such as steel, automobiles or consumer electronics. However, software is produced in a factory construct as well. “Software factory” generally refers to the collection of tools, assets and processes required…

    Read More

  • How Microsoft Purview can help with ransomware regulatory compliance

    PRIVACY PRIVACY Nations across the globe are taking regulatory action to reduce the ransomware threat. In March, for example, new U.S. ransomware reporting requirements were signed into law. Covered entities that experience a cyber incident must report it to the Cybersecurity and Infrastructure Security Agency (CISA) within 72 hours after the covered entity believes that…

    Read More

  • Yodel Cyber Incident Disrupts UK Deliveries

    PRIVACY PRIVACY Experts suspect ransomware as the cause Read More

    Read More

  • Euro Cops Dismantle Multimillion-Dollar Phishing Gang

    PRIVACY PRIVACY Europol trumpets Dutch and Belgian police work Read More

    Read More

  • #InfosecurityEurope2022: Geopolitical Tensions a “Danger” to Cybersecurity

    PRIVACY PRIVACY During a keynote talk, Mischa Glenny explained challenges geopolitical tensions create for cybersecurity Read More

    Read More

News, Advisories and much more

Exit mobile version