NSS Labs test exposes weaknesses in NGFW products
Firewalls are the most widely deployed network security devices. Enterprises expect next generation firewalls (NGFWs) to prevent exploits and malware from infecting critical …
Multi-stage attack techniques are making network defense difficult
IT managers are inundated with cyberattacks coming from all directions and are struggling to keep up due to a lack of security expertise, budget and up to date technology, …
Sophos acquires Rook Security
Sophos, a global leader in network and endpoint security, has acquired Rook Security, a pioneer and leader in managed detection and response (MDR) services. Rook Security …
Microsoft updates break AV software, again!
Microsoft’s May 2019 security fixes have again disrupted the normal functioning of some endpoint security products on certain Windows versions. Current problems …
IT managers can’t ignore endpoints because most cyberattacks start there
IT managers are more likely to catch cybercriminals on their organization’s servers and networks than anywhere else, according to the 7 Uncomfortable Truths of Endpoint …
Stealthy cryptomining apps still on Google Play
Researchers have flagged 25 apps on Google Play that are surreptitiously mining cryptocurrency for their developers, and some of these have still not been removed, they warn. …
How the SamSam attacker stole millions from US companies
There are many reasons that the SamSam ransomware has achieved widespread notoriety: it disrupted the operations of some of its victims to a point that the attack …
Photo gallery: Infosecurity Europe 2018 Expo, part 2
Infosecurity Europe 2018 is underway at Olympia, London. Here are a few photos from the expo floor. Featured companies: Bomgar, Qualys, Fidelis Cybersecurity, Cisco, Nuvias Group.
Thousands of government, orgs’ websites found serving crypto mining script
On Sunday, over 4,200 websites around the world started hijacking visitors’ browsers to mine the Monero crypto currency. The attack The problem was first noticed and …
Malware creators increasingly run their business like legitimate software companies
The continuing increase in ransomware attacks is, partly, due to how easy the malware can be built and used by attackers that have limited technical skills. Take for example …
Is Europe ready for GDPR?
What impact will GDPR have on businesses across the UK, France, Belgium and Luxemburg? Vanson Bourne surveyed 625 IT decision makers in four countries and found that the UK is …
Super Free Music Player is the latest malware on Google Play
Another day, another piece of malware lurking on Google Play, masquerading as a free and helpful app. This time it’s called “Super Free Music Player” and is …
Featured news
Resources
Don't miss
- Acronis CISO on why backup strategies fail and how to make them resilient
- Ransomware attackers are “vishing” organizations via Microsoft Teams
- Scam Yourself attacks: How social engineering is evolving
- Addressing the intersection of cyber and physical security threats
- Fleet: Open-source platform for IT and security teams