Five ways attackers can create havoc in smart homes
Attack motives include burglaries, cyber stalking, botnet creation, cryptocurrency mining hubs, theft of personal information or financial information.
Unsecured WiFi leaving schools vulnerable to attack
Popular enterprise printers riddled with security risks
CrowdStrike launches threat-scoring platform
Kaspersky opens first Transparency Center in APAC
Genetec shows impressive growth, says IHS Markit
Successful threat hunting requires curation & collaboration
Cylance report looks into questionable pentesting practices
The report demonstrates how the line distinguishing pentesting exercises from actual threat actor behaviour has thinned.
Sophos report reveals barriers to cybersecurity preparedness in APJ
85% of APJ organisations believe the biggest challenge to their security in the next 24 months will be improving cybersecurity awareness and education among employees and leadership.
Banking malware grows 50% while cryptominers decline – Check Point
The report’s findings are based on data drawn from Check Point’s between January and June 2019, highlighting the key tactics cyber-criminals are using to attack businesses.
Ping Identity launches private cloud identity solution
Enterprises need a dependable way for customers, employees and partners to conveniently sign-on to their services and applications.
ESET: Ignoring human element in cyber safety a mistake
"We believe that when employees are aware of their potential blindspots, they are naturally more invested and better prepared to be wary of things that may not seem quite right."
Attackers upping the ante on evasion and anti-analysis - Fortinet
Cyber-adversaries are becoming more sophisticated in their obfuscation and anti-analysis practices to avoid detection.
Gartner, Forrester name Retarus for Email Security
The information logistics firm was listed as one of the twelve most important providers of email security services in the world by Forrester Research.
Business ransomware detections spiking - Malwarebytes
Ransomware attackers are targeting large, ill-prepared public and private organisations with easy-to-exploit vulnerabilities.
430,000 people hit with financial malware
Financial malware, that is malware that targets finances, cryptocurrencies and web-money services, has increased by 7% from the same period last year, according to new research from Kaspersky.
BitSight announces enterprise analytics to help security leaders manage risk
The solution provides visibility into which groups have the biggest impact on their organisations' overall cyber risk posture and helps identify areas for security performance improvement.
Cohesity launches new vulnerability scan using backup data
The application works by scanning backup copies on to identify any vulnerabilities across an organisation’s IT environment.
OutSystems gains new certifications for cloud security compliance
These certifications demonstrate the level of commitment OutSystems has to ensuring the privacy and protection of its customers’ data in the cloud.
Slack tackles balance between productivity and security
The new features include more options to protect data without interrupting employees’ requirements to get work done.
SentinelOne launches next-gen server protection offering
SentinelOne has released a new next-generation server and protection offering, which is purpose-built for containers.
Understanding VMware in just 4 minutes
We look at the companies history and key technology solutions.
Security teams spend 25% of their time chasing false positives
The report also showed that teams were also concerned about investigating actionable intelligence and building incident timelines as well as cleaning, fixing and/or patching networks.
Yubico launches lightning-compatible security key
Today, the YubiKey 5Ci can be used to secure the 1Password, Bitwarden, Dashlane, Idaptive, LastPass, and Okta iOS mobile applications.
Vulnerabilities in cloud containers soar, report finds
“Cloud technology and adoption has obviously skyrocketed, so it’s no surprise that vulnerabilities within cloud technology will increase."
Check Point: Attackers executing commands remotely with latest malware
Threat actors are quick to try and exploit new vulnerabilities when they emerge, before organisations have had the chance to patch them.