Tag: IT
-
With attacks on the rise, the need for cyber resiliency is now inevitable
The ubiquity of ransomware attacks seems to be an overstated theme in many enterprise events, but that’s only due to how scary the trends …
-
US, Europe formally blame Russia for data wiper attacks against Ukraine, Viasat
The US and the European Union have officially blamed Russia for a series of destructive data-wiping malware infections in Ukrainian …
-
APT34 targets Jordan Government using new Saitama backdoor
On April 26th, we identified a suspicious email that targeted a government official from Jordan’s foreign ministry. The email contained a …
-
Email security startup Abnormal Security raises $210M in funding
today, also included the participation of Greylock Partners and Menlo Ventures. The investment brings the San Francisco-based startup’s …
-
Microsoft patches Windows LSA spoofing zero-day under active attack (CVE-2022-26925)
May 2022 Patch Tuesday is here, and Microsoft has marked it by releasing fixes for 74 CVE-numbered vulnerabilities, including one zero-day …
-
How Does Cybersecurity Work in Maritime Industries?
Given that electronics appear to govern everything, the marine industry’s cybersecurity is important. From navigation to maintenance, the …
-
Personal details of 21M SuperVPN, GeckoVPN users leaked on Telegram
In total, the database contains 10GB worth of data from companies like SuperVPN, GeckoVPN, and ChatVPN which is now available for free …
-
Better Cybercrime Metrics Act signed into law
, will, in turn, standardize the kinds of threats organizations face: the adversaries that promulgate attacks, as well as the nature and …
-
Colonial Pipeline facing $1,000,000 fine for poor recovery plans
If you were in the US this time last year, you won’t have forgotten, and you may even have been affected by, the ransomware attack on …
-
Intel details IPU roadmap
Intel is betting that future data-center operations will depend on increasingly powerful servers running ASIC-based, programable CPUs, and …
-
How do security leaders measure program maturity?
Ninety-one percent of chief information security officers (CISOs), chief information officers (CIOs), and senior security and risk managers …
-
5 Best Practices for Securing Kubernetes Runtime Monitoring
Here are five security best practices for Kubernetes runtime monitoring and detection. 1. Monitor Network Connections It is critical to map …
●●●