News

  • Data Breach Disrupts UK Army Recruitment

    PRIVACY PRIVACY British Army online recruitment system down since March following data breach Read More

    Read More

  • Emotet Tests New TTPs

    PRIVACY PRIVACY Botnet’s operators spotted spring cleaning its delivery tactics, techniques and procedures Read More

    Read More

  • Siloed Tech Prompts Security Worries

    PRIVACY PRIVACY IT leaders fear fragmented tech management could increase cyber risk Read More

    Read More

  • PureVPN introduces quantum-resistant feature to enhance security, tackle threats

    PRIVACY PRIVACY Virtual private network (VPN) provider PureVPN has introduced a quantum-resistant feature to its OpenVPN protocol to provide users with more security and privacy for the post-quantum world. The firm has partnered with Quantinuum to deploy quantum-resistant encryption keys which, using its Quantum Origin platform, are generated via a verified quantum process, PureVPN said.…

    Read More

  • Emotet tests new attack techniques: Sign of things to come?

    PRIVACY PRIVACY Notorious threat group Emotet has been detected testing new and significantly different attack techniques potentially in preparation for larger campaigns or selective and limited attacks, according to research from cybersecurity vendor Proofpoint. The firm stated the activity occurred while the prolific botnet and Trojan threat actor was on a period of hiatus and…

    Read More

  • DevOps release process

    PRIVACY PRIVACY In the previous article, we covered the build and test process and why it’s important to use automated scanning tools for security scanning and remediation. The build pipeline compiles the software and packages into an artifact. The artifact is then stored in a repository (called a registry) where it can be retrieved by…

    Read More

  • Security Teams Should Be Addressing Quantum Cyber-Threats Now

    PRIVACY PRIVACY Organizations should move toward post-quantum cryptography now to counter upcoming quantum cyber-threats Read More

    Read More

  • Two More Indicted Over North Korea Sanctions Evasion Plot

    PRIVACY PRIVACY Brit and Spaniard face 20 years behind bars if found guilty Read More

    Read More

  • New SDP 2.0 specification facilitates zero-trust maturity

    PRIVACY PRIVACY The Cloud Security Alliance (CSA) recently published the Software-Defined Perimeter (SDP) 2.0 specification, which is created by their SDP and zero-trust working groups. Given that the original specification was published in 2014 and we’ve seen industry-wide eagerness to adopt zero trust, this update is timely. SDP ties closely to the pursuit of implementing…

    Read More

  • The cloud security emperor has no pants

    PRIVACY PRIVACY As anyone who has worked on a cross-functional team with no clear owner knows, “shared” or “joint” responsibility often means that everyone assumes that someone else is taking care of the problem. Without clear effort to make sure that nothing falls between the two (or more) teams, something always gets missed. The shared…

    Read More

News, Advisories and much more

Exit mobile version