Browsing Category
Cybersecurity
Persistent Espionage Campaign Targets APAC Governments
Cybersecurity experts at Kaspersky have unveiled a covert and highly advanced espionage campaign, codenamed “TetrisPhantom.”
The…
Fake Browser Updates Used in Malware Distribution
Cybersecurity researchers from Proofpoint have identified a rising trend in threat activity that employs fake browser updates to…
Passive Optical Networks: A Game Changer for Now And The Future
By Folden Peterson, Director of the Federal Initiative at Quadrant Four, and John Taglieri, President of Mission Focused…
Will Zero Trust Replace SD-WAN?
By Jaye Tillson, Director of Strategy, Axis Security
A question I get asked frequently is, “Will zero trust replace SD-WAN?”.…
Rising AI-Fueled Phishing Drives Demand for Password Alternatives
Online phishing scams are becoming more frequent and more sophisticated, according to the Online Authentication Barometer,…
Cisco Warns of Critical Vulnerability in IOS XE Software
Cisco has issued an urgent warning about the active exploitation of a critical vulnerability in the Web User Interface (Web UI)…
A Third of Organizations Not Ready to Comply with NIS2
Just a third (34%) of impacted organizations in the UK, France and Germany are prepared for the EU’s updated Network and…
Ransomware Targets Unpatched WS_FTP Servers
Unpatched WS_FTP servers exposed to the internet have become prime targets for ransomware attacks, with threat actors exploiting a…
MOVEit’s Ransomware Attack Highlights the State of Cybersecurity
By Ben Smith, Field Chief Technology Officer, NetWitness
Vulnerability is a four-letter word in the world of cybersecurity, as…
Growing Concern Over Role of Hacktivism in Israel-Hamas Conflict
Hacktivists have claimed to hit Israeli websites through DDoS and defacement attacks following the outbreak of conflict between…