Latest Blog Posts

Fa42af438e58b799189dd26386f5870f

Chrome 71 Patches 43 Vulnerabilities

December 07, 2018 Added by:Ionut Arghire

Google has released Chrome 71 to the stable channel with 43 security fixes inside, as well as with a series of additional protections to improve the overall user experience.

Comments  (0)

211571f3e14099fd9a6c172426982ca5

Trojan Horses for the Mind

December 07, 2018 Added by:Perry Carpenter

When designed well, our messaging can sneak past mental defenses and noise. In other words, the way we design and deliver our messages can become a Trojan Horse.

Comments  (0)

Ac61693522e1c081485f696ae6a5fb4b

5 Cybersecurity Predictions for 2019

December 04, 2018 Added by:Joseph Carson

The year is coming to a close. Therefore, it is important to analyze developing trends and prepare for the ever-changing threat landscape.

Comments  (0)

Fa42af438e58b799189dd26386f5870f

OceanLotus Targets Southeast Asia in New Watering Hole Campaign

December 03, 2018 Added by:Ionut Arghire

A cyber-espionage group believed to be operating out of Vietnam has compromised over 20 websites as part of a watering hole campaign targeting users in Southeast Asia, ESET reports.

Comments  (0)

4238fc46fe869de66700ec14d6738248

Securing the BYoD Workplace

November 28, 2018 Added by:Scott Gordon

A secure organization rises to meet the challenges posed by BYoD instead of letting them fly overhead.

Comments  (0)

5a2b18375de7f48025d85018748d326e

Cyber Security Lessons from Abroad – Australia’s Essential Eight

November 28, 2018 Added by:Kevin Alexandra

Whitelisting applications and restricting administrative privileges play important roles in helping organisations identify vulnerable assets and set appropriate defences for their networks and applications.

Comments  (0)

4238fc46fe869de66700ec14d6738248

Will We Get a GDPR for the IoT?

November 28, 2018 Added by:Scott Gordon

It might then be a good idea to imbue IoT security with the kind of weight that the GDPR gives personal data.

Comments  (0)

Fa42af438e58b799189dd26386f5870f

'DarkGate' Campaign Targets Europeans with Multiple Payloads

November 16, 2018 Added by:Ionut Arghire

A newly discovered malware campaign is targeting users in Europe with various payloads, has a reactive command and control (C&C) system and can remotely control infected machines, enSilo security researchers warn.

Comments  (0)

Fa42af438e58b799189dd26386f5870f

Facebook Patches Bug that Exposed Private Information

November 15, 2018 Added by:Ionut Arghire

Facebook recently addressed a vulnerability that could have allowed anyone to access private information about users and their contacts.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

A Human-Centered Approach to Building a Smart, Satisfied Information Security Team

November 15, 2018 Added by:Steve Durbin

Building tomorrow’s security workforce is essential to address shortfalls in skills and capabilities and to deliver robust and long-term security for organizations in the digital age.

Comments  (0)

A98c8f7dbb46467b790e2ac1fbbd3f50

Addressing the CISO’s Key Challenges in 2018 and Beyond with Endpoint Detection and Response

November 12, 2018 Added by:Liviu Arsene

Today more than ever, incident response teams need to be given the tools to analyze and investigate suspicious activities, and adequately respond to evolving threats.

Comments  (0)

19a7ca3d87a072ea73d7ad53df294881

Fight Fileless Malware on All Fronts

November 06, 2018 Added by:Phil Richards

Fileless malware has become the darling of cyber criminals because, quite simply, it’s a no-brainer.

Comments  (0)

294bb83c6b16fd49b4b29b275f319000

How to Protect SMBs Against Phishing Attacks via Social Engineering

November 06, 2018 Added by:Timur Kovalev

Attackers are constantly changing tactics, so ensuring that you are armed against the latest threats is critical.

Comments  (0)

1cc412454c5b595d95d2a2ef19d9755f

DDoS Disruption: Election Attacks

November 05, 2018 Added by:Hardik Modi

With all eyes on the 2018 US midterm elections November 6, election officials are on high alert for DDoS attacks.

Comments  (0)

A4c42684a8889958a83ecca5d2fe59e5

Buy, Rent, or Uber Your Security Operations Center

November 05, 2018 Added by:A. N. Ananth

What better way to provide continuous monitoring and analysis than through a security operations center (SOC)? But a SOC is complex and expensive.

Comments  (0)

B62486f17abbb685a2012b729dc70376

What You Need to Know about the Recent Apache Struts Vulnerability

November 05, 2018 Added by:Tushar Richabadas

Researchers recently revealed a vulnerability in Apache Struts, a popular type of enterprise software. Active exploit attempts weren’t far behind.

Comments  (0)


« First < Previous | 1 - 2 - 3 - 4 - 5 | Next > Last »