Data Loss Prevention in Turbulent Times
By Otavio Freire, CTO & Co-Founder at SafeGuard Cyber Data, the saying goes, is the new oil. This probably understates the case: Not only is data at the core of…
Experts devised a new attack to bypass Microsoft PatchGuard
A security researcher discovered a bug in PatchGuard Windows security feature that can allow loading unsigned malicious code into the Windows kernel. Japanese researcher Kento Oki has discovered a bug…
Android stalkerware, a danger for victims and stalkers
ESET research shows that Android stalkerware apps are affected by vulnerabilities that further threaten victims. ESET research reveals that common Android stalkerware apps are affected with vulnerabilities that could expose…
Secure Data Recovery Services: Protecting Business Continuity
By Dmitri Kardashev, Founder and CEO, SecureData, Inc. In today’s world, consumers and businesses alike require consistent and easy access to their data. Whether it’s large customer databases that an…
China-linked APT uses a new backdoor in attacks at Russian defense contractor
China-linked APT group targets Russian nuclear sub designer with an undocumented backdoor A China-linked cyberespionage group targets a Russian defense contractor involved in designing nuclear submarines for the Russian Navy….
Patchstack Protects The Web With Community
By Oliver Sild, the co-founder and CEO of Patchstack Web applications today are built with heavy use of open source code – all of which is largely put together by…
The skills to propel your team’s cyber security defense
By Andrew Loschmann, Chief Operating Officer, Field Effect Advancing your cyber security capabilities as you scale is an obvious need. But if you’re resourced like many infosec departments, either very lean or…
New Cring ransomware deployed targeting unpatched Fortinet VPN devices
Attackers are actively exploiting the CVE-2018-13379 flaw in Fortinet VPN to deploy the Cring ransomware to organizations in the industrial sector. Threat actors are actively exploiting the CVE-2018-13379 vulnerability in Fortinet…
The Best Network Protection: Go Deep or Go Broad?
By Albert Zhichun Li, Chief Scientist, Stellar Cyber Almost since the beginning of network security, vendors and practitioners have wrestled with choices between going deep and going broad for their…
Peer-To-Peer Cybersecurity Insights For 2021
Based on real practitioners’ experiences By Stuart Berman, IT Central Station Super User December is typically a month when people who work in the IT field offer predictions for the…
SOCs to Turn to Security Automation to Cope with Growing Threats
Increasingly complex threats, staffing shortages, and rising costs are driving investments in security automation By Chris Triolo, Vice President of Customer Success, FireEye The cybersecurity landscape is becoming ever more…
Innovation, Automation and Securing A “Work from Anywhere” Environment In The Middle East
By Mazen A. Dohaji, Vice President, India, Middle East, Turkey & Africa (iMETA), LogRhythm. Throughout 2020, enterprises and public sector organizations across the Middle East have been managing disruption and…