Browsing Category
Cybersecurity
Russian APT29 Group Targets German Politicians
Security researchers have warned Western political parties to be on their guard after uncovering a new cyber-espionage campaign…
Classic Information Security Management Errors
How many errors does your organization have?
By Zsolt Baranya, Information Security Auditor, Black Cell Ltd.
During my work…
How to Identify and Respond to End-of-Life and Out-of-Service Operating…
By Chahak Mittal, GRC Manager, Universal Logistics
In the ever-changing world of technology, managing end-of-life (EOL) and…
New AcidPour Wiper Targeting Linux Devices Spotted in Ukraine
A new variant of the wiper malware AcidRain, known as AcidPour, has been discovered by…
Prioritizing Action After the Threat Headlines
By Douglas McKee, Executive Director, Threat Research, SonicWall
As Ferris Bueller once said, “Life moves pretty fast.” Most…
US Government Releases New DDoS Attack Guidance for Public Sector
The US government has published new distributed denial-of-service (DDoS) attack guidance for public sector entities to help…
Unmasking the Vulnerabilities in Telecom Signaling: A Call for Enhanced…
Mobilizing Collective Action for Telecom Signaling Security
By Rowland Corr, Vice President and Head of Government Relations,…
US Treasury Targets Russian Entities in Cyber Influence Campaign
The US Department of the Treasury’s Office of Foreign Assets Control (OFAC) announced on Wednesday the designation of two…
US Legislation Targets Data Sharing With Foreign Adversaries
In a bipartisan effort, the US House of Representatives has approved legislation to curtail the sharing of Americans’ sensitive…
Security Leaders Acknowledge API Security Gaps Despite Looming Threat
A vast majority of security leaders are aware that application programmable interfaces (APIs) have become a worrying attack…