Browsing Category
Cybersecurity
#RSAC: Securing Software Supply Chains Requires Outside-the-Box Thinking
New security solutions and ideas are needed to overcome the unique security challenges of software supply chains, according to a…
Beyond Anti-Virus ‘Shark Nets’: Why Current Approaches to Cybersecurity…
By Ms Camellia Chan, Founder and CEO of Flexxon
Shark nets have a notorious reputation: for failing at doing their intended job,…
Microsoft Blames Clop Affiliate for PaperCut Attacks
Microsoft has claimed that recent attacks exploiting two vulnerabilities in the PaperCut print management software are likely the…
Man Arrested for Selling Data on 300 Million Victims to Russians
Ukrainian cyber police have arrested a 36-year-old man from the western city of Netishyn on suspicion of selling data to Russian…
Google Goes After CryptBot Distributors
Google has revealed details of a new legal campaign to pursue the operators of prolific information-stealing malware, which has so…
#RSAC: Experts Urge Applying Lessons Learned from Russia-Ukraine Cyberwar…
Lessons learned from the ongoing cyberwarfare that is raging between Russia and Ukraine ought to be applied to other scenarios,…
Pro Sports Grapple with Convergence of Cyber and Physical Security…
Professional sport faces unique cyber-threats and challenges, especially sounding the tie-in cyber has with physical security.…
#RSAC: ISACA’s New Ransomware Incident Checklist to Aid Cyber Pros
ISACA has published a new quick reference document designed to help organizations prepare to mitigate ransomware incidents.
The…
Evasive Panda’s Backdoor MgBot Delivered Via Chinese Software Updates
Security researchers at ESET have observed a new malware campaign by the APT group known as Evasive Panda (as well as Daggerfly…
Critical Flaw Patched in VMware Workstation and Fusion
VMware has addressed multiple security vulnerabilities in its Workstation and Fusion products. The vulnerabilities, identified as…