Call the Doctor! mHealth Apps are Exposing Medical Records
By George McGregor, VP of Marketing, Approov A new report by Knight Ink, sponsored by Mobile API Security firm Approov describes how thirty leading mHealth applications were tested and everyone…
Security and Remote Management: What Is the Market Looking Like as We Head Towards 2021?
By Gil Pekelamn, CEO, Atera For many IT professionals and managed service providers (MSPs), remote management has always been part of the deal. Especially in this generation’s global economy, service…
Making the Most of Virtual Cybersecurity Events for your Company and the Community
By Trevor Daughney, VP, product marketing, Exabeam With the pandemic and shutdown orders still in full effect in many regions worldwide, moving in-person events to virtual experiences is the reality…
T-Mobile customers were hit with SIM swapping attacks
The telecommunications giant T-Mobile disclosed a data breach after some of its customers were apparently affected by SIM swap attacks. The telecommunications provider T-Mobile has disclosed a data breach after…
Thousands of VMware Center servers exposed online and potentially vulnerable to CVE-2021-21972 flaw
A Chinese security researcher published a PoC code for the CVE-2021-21972 vulnerability in VMware Center, thousands of vulnerable servers are exposed online. A Chinese security researcher published the Proof-of-concept exploit code for…
Brave New World: Safari Content Blocking
By Andrey Meshkov, CEO and CTO at AdGuard Content blocking is not a priority for Apple and WebKit. Content blocking in Safari is possible despite all its issues and limitations….
Data Risk, Intelligence and Insider Threats
When it comes to securing networks in today’s business environment, the single biggest challenge firms must contend with is that of the insider threat. While the term is typically associated…
Credit Cards, Cash and Compliance, Oh My! Eliminating Audit Fatigue in The Financial Services Sector
By Steve Horvath, Vice President, Strategy & Cloud, Telos Corporation When we think of our finances, we think of them as a responsibility – a commitment to ensure payments are…
3.2billion records leaked, Part II
The Largest compilation of emails and passwords (COMB), more than 3.2 billion login credentials, has been leaked on a popular hacking forum. More than 3.2 billion unique pairs of cleartext…
Hackers abuse Plex Media servers for DDoS amplification attacks
Netscout experts warn of DDoS-for-hire services abusing Plex Media servers to bounce junk traffic and amplify DDoS attacks. Security researchers from Netscout discovered DDoS-for-hire services have found a way to abuse Plex…
2021 Predictions: Addressing the Challenge of Cloud-Native App Security
By Ankur Singla, Founder and CEO of Volterra Organizations of all sizes are adopting cloud-native application design and deployment practices as they continue to digitally transform business processes. This includes…
5G Security
Towards trustworthy products for resilient networks By David Soldani, CTSO, Huawei Technologies 5G technologies will be applied to many vertical industries and support various usage scenarios, such as applications…