Jeff Costlow stories

New report says 79% of Australian IT leaders agree on need for XDR
Fri, 10th Feb 2023
#
edr
#
xdr
#
asia pacific
The international study, performed by Wakefield Research, underlined the successes, barriers, challenges and hesitations that organisations face.

Organisations exposing highly sensitive protocols to public internet
Thu, 11th Aug 2022
#
big data
#
bi
#
data analytics
More than 60% of organisations expose remote control protocol SSH to the public internet, while 36% of organisations expose the insecure FTP protocol.

APAC organisations fail to disclose ransomware breaches
Tue, 24th May 2022
#
ransomware
#
malware
#
cybersecurity
85% of organisations in APAC were breached by ransomware at least once in the past five years, but only 28% publicly disclosed the incident.

SonicWall ransomware attack 'should have been avoided'
Tue, 20th Jul 2021
#
malware
#
ransomware
#
cybersecurity
SonicWall warns customers of ransomware campaign on legacy firmware, urging them to disconnect devices from the network immediately.

Security vendors weigh in as fallout of Kaseya cyber attack continues
Thu, 8th Jul 2021
#
firewall
#
ransomware
#
malware
Ransomware attack on Kaseya serves as a stark reminder of the increasing threat faced by organizations, say security experts.

ExtraHop consults on network detection response for MITRE ATT&CK framework
Wed, 7th Jul 2021
#
multi-cloud
#
ndr
#
extrahop
MITRE ATT-CK and ExtraHop collaborate to develop new network detection and response methodologies within the cybersecurity framework.

Ripple20 threat has potential for 'vast exploitation', ExtraHop researchers find
Tue, 15th Sep 2020
#
ndr
#
extrahop
#
security vulnerabilities
One in three IT environments vulnerable to Ripple20 cyber threat, says ExtraHop. Attackers can exploit 19 vulnerabilities in the Treck networking stack.

Ripple20 threat could affect 35% of all IT environments – ExtraHop
Mon, 14th Sep 2020
#
extrahop
#
security vulnerabilities
#
cyber threats
The vulnerabilities have the potential to ‘ripple’ through complex software supply chains, enabling attackers to steal data or execute code.