30 Docker images downloaded 20M times in cryptojacking attacks
Experts discovered that 30 malicious Docker images with a total number of 20 million pulls were involved in cryptomining operations. Palo Alto Network researcher Aviv Sasson discovered 30 malicious Docker images,…
Bitcoin Soars but Will Security Risks Spark Greater Regulation?
By Marcella Arthur – VP, Global Marketing at Unbound Tech Cryptocurrency is now the third largest payment system in the world, hot on the heels of Visa and Mastercard after…
Hackers disrupted live broadcasts at Channel Nine. Is it a Russian retaliation?
A cyber attack has disrupted the Australian Channel Nine’s live broadcasts, the company was unable to transmit its Sunday morning news program. A cyber attack has hit the Australian Channel Nine’s live…
Transitioning to Remote Work: The Apps You’ll Need to Ensure A Productive Workforce
By Ikechukwu Nnabeze, SEO Copywriter, Traqq The world is changing at a swift pace. A couple of years ago, remote work was an unheard term in the business world; it…
Top Tips For Securing Your DevOps Environment
By George J. Newton As of October 2020, experts estimate that roughly 60% of the world’s population is connected to the internet via some kind of device. As a result,…
Peer-To-Peer Cybersecurity Insights For 2021
Based on real practitioners’ experiences By Stuart Berman, IT Central Station Super User December is typically a month when people who work in the IT field offer predictions for the…
Innovation, Automation and Securing A “Work from Anywhere” Environment In The Middle East
By Mazen A. Dohaji, Vice President, India, Middle East, Turkey & Africa (iMETA), LogRhythm. Throughout 2020, enterprises and public sector organizations across the Middle East have been managing disruption and…
REvil ransomware gang hacked Acer and is demanding a $50 million ransom
Taiwanese multinational hardware and electronics corporation Acer was victim of a REvil ransomware attack, the gang demanded a $50,000,000 ransom. Taiwanese computer giant Acer was victim of the REvil ransomware attack, the gang…
Redefining Digital Risk: 3 Considerations for Your Cybersecurity Strategy in 2021
As we enter a new era of interconnected cybersecurity threats, companies and organizations would be wise to overhaul their entire view of the online landscape in order to be fully…
Moving to Active Defense: What It Means, How It Works and What You Can Do Now
By Ofer Israeli, CEO and founder, Illusive Networks Despite the myriad cybersecurity solutions out there, breaches, attacks and exploitations continue. The old approach isn’t working; cybersecurity teams need to move…
Your Vulnerabilities are Making You Miss Your Misconfigurations
IT organizations regularly configure asset discovery tools in ways that leave them open to abuse by attackers; Vendor configuration documentation lacks details on the risk. By Evan Anderson, Director of…
Why ‘Thinking Small’ Is the Way to Stop Ransomware and Other Cyber Attacks
By Yuval Baron, CEO at AlgoSec, explains why micro-segmentation is one of the most effective methods to limit the damage of attacks on a network On August 15, 2020, the…