Latest Blog Posts

Fa42af438e58b799189dd26386f5870f

Internet-Exposed IBM BigFix Relays May Lead to Full Remote Compromise

March 21, 2019 Added by:Ionut Arghire

Internet-facing relays in IBM BigFix deployments could lead to information disclosure and potential full remote compromise if not properly configured, Atredis Partners security researchers have discovered.

Comments  (0)

D63b67548a5fd4323d25d572dd43bd76

Google Chrome Zero-Day: What Are The Risks?

March 19, 2019 Added by:Sam Bocetta

Google Chrome has long been considered one of the most reliable, effective, functional and secure web browsers. So when the news of a “zero-day” recently arrived, users were naturally concerned.

Comments  (0)

Fa42af438e58b799189dd26386f5870f

1 Million Apps Patched in Android Security Improvement Program

March 01, 2019 Added by:Ionut Arghire

Over its five-year lifetime, the Android Application Security Improvement Program helped over 300,000 developers to fix more than 1,000,000 apps on Google Play, Google says.

Comments  (0)

47c22ebc25ad3d1dac97fc04f17f8e52

The Role of Analytics in Protecting Healthcare Data Privacy and Security

February 27, 2019 Added by:Nilesh Dherange

Healthcare companies face their biggest threats from malicious insiders that abuse their access privileges to view or exfiltrate PII and PHI.

Comments  (0)

Fa42af438e58b799189dd26386f5870f

WINDSHIFT Hackers Target Government Agency in the Middle East

February 26, 2019 Added by:Ionut Arghire

A recently discovered threat actor was observed targeting a Middle Eastern government agency on several occasions over the course of last year, Palo Alto Networks security researchers reveal.

Comments  (0)

294bb83c6b16fd49b4b29b275f319000

The Rise of Ransomware and the Consequences for SMBs

February 21, 2019 Added by:Timur Kovalev

Ransomware works; that’s why hackers keep honing their techniques. SMBs need to be especially careful when it comes to cybersecurity and should work with vendors that understand their unique security needs.

Comments  (0)

D63b67548a5fd4323d25d572dd43bd76

Trump Administration Starts the Ball Rolling with the National Cyber Strategy

February 19, 2019 Added by:Sam Bocetta

The topic of cybersecurity won’t go away. Like national security in general, it will remain eternal fodder for future politicians to bat around

Comments  (0)

6dc5fbf4195307a7504ede26fd385662

A Call to Structure

February 15, 2019 Added by:Chris O'Brien

One of the most significant challenges you face when building a threat Intelligence team is about how to best take on the ever-growing amount of Threat Intel.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

What CEOs Need to Know About the Future of Cybersecurity

February 14, 2019 Added by:Steve Durbin

CEOs need to take the lead and take stock now in order to ensure that their organizations are better prepared and engaged to deal with these ever-emerging challenges.

Comments  (0)

71fd135c31a6d0bc64f3b46c190a4590

Who’s Responsible for Your Cyber-Security?

February 12, 2019 Added by:Matt Johnson

Cyber security is everybody’s responsibility – make sure that staff have the tools, and the knowledge, to do it properly.

Comments  (0)

Fa42af438e58b799189dd26386f5870f

CERT/CC Warns of Vulnerabilities in Marvell Avastar Wireless SoCs

February 08, 2019 Added by:Ionut Arghire

The CERT Coordination Center (CERT/CC) has issued a vulnerability note providing information on a series of security issues impacting Marvell Avastar wireless system on chip (SoC) models.

Comments  (0)

Fa42af438e58b799189dd26386f5870f

Mozilla Concerned of Facebook’s Lack of Transparency

February 05, 2019 Added by:Ionut Arghire

Mozilla is concerned about Facebook’s lack of transparency regarding political advertising, Chief Operating Officer Denelle Dixon said last week in a letter to the European Commission.

Comments  (0)

4fffaa4acdf2dde64272fc40fe7c0f99

OWASP: What Are the Top 10 Threats and Why Does It Matter?

January 30, 2019 Added by:Nitzan Miron

Since the founding of the Open Web Application Security Project (OWASP) in 2001, it has become a leading resource for online security best practices.

Comments  (0)

Fa42af438e58b799189dd26386f5870f

Magento Patches Command Execution, Local File Read Flaws

January 29, 2019 Added by:Ionut Arghire

Magento recently addressed two vulnerabilities that could lead to command execution and local file read, a SCRT security researcher reveals.

Comments  (0)

71fd135c31a6d0bc64f3b46c190a4590

The Biggest Security Hurdles in Your Business, and How to Overcome Them

January 23, 2019 Added by:Matt Johnson

Many organisations are still left in the dark when it comes to exactly what the most common, and pressing cyber security challenges are.

Comments  (0)

368febea925e4f73f6df3d1fa3c8d577

Four Technologies that will Increase Cybersecurity Risk in 2019

January 17, 2019 Added by:Srinivas Mukkamala

While advances in technology provide many benefits, they also open new threat vectors and the potential for attacks that can spread quickly over connected ecosystems.

Comments  (0)


« First < Previous | 1 - 2 - 3 - 4 - 5 | Next > Last »