GUEST RESEARCH: Attivo Networks, the experts in preventing identity privilege escalation and detecting lateral movement attacks, today announced the availability of a new research report conducted by Enterprise Management Associates (EMA) and commissioned in part by Attivo Networks. The report focuses on Active Directory (AD), the directory-based identity services platform used by 90% of enterprises worldwide, exploring the obstacles and threats organisations face when protecting AD and how they adapt to address these growing concerns.
COMPANY NEWS Claroty, a leader in industrial cybersecurity, launches Team82, its new research arm dedicated to threat research reports, policies, and disclosures. It recently published a report that details vulnerabilities in cloud-based management platforms and the need to secure implementations.
Apple enterprise management specialist Jamf has announced a series of new security capabilities.
Just days after the arrival of major updates for Apple's operating systems, the company has released a fresh round of security updates for macOS, iOS, iPadOS and watchOS.
Microsoft has issued patches for four remotely-exploitable vulnerabilities in its Exchange Server product, a little more than a month after the company warned of four zero-day exploits being used to attack the application.
A threat intelligence report from security provider Onapsis and business software vendor SAP claims that threat actors are actively exploiting unprotected mission-critical SAP applications.
The number of APT groups "exploiting the latest Exchange vulnerabilities grows, with thousands of email servers under siege" according to security company ESET.
GUEST OPINION by Jim Cook, Attivo Networks: Separating truth from fiction in these days of social media campaigns and so-called fake news can often be challenging. As a result, false data that appears valuable can influence people.
COVID-19 related threats are the single largest type of threat in the first half of this year, according to one security firm which says it blocked 8.8 million COVID-19 related threats, nearly 92% of which were spam delivered via emails.
Veteran vulnerability researcher Dave Aitel has offered his views on a major flaw in the BIG-IP range of devices, saying that the fact many people had assumed it had never been found and exploited could well be incorrect.
When American tech journalists see the words "vulnerability" and "Huawei" in close proximity these days, they tend to get over-excited and, as a result, produce copy that goes quite wonky.
The number of vulnerabilities in Microsoft products increased last year, with a total of 700 flaws found, a study by privileged identity management and vulnerability management product manufacturer Beyond Trust says, adding that 81% of these could have been kept in check by not giving users blanket administrator rights.
Microsoft was targeted by eight of the top ten vulnerabilities in 2018, a study by the security intelligence firm Recorded Future has found.
A recent report from the US Government Accountability Office paints a very bleak picture of the cyber security of modern US weapons systems.
Two vulnerabilities in Facebook's "view as" feature — a feature that lets people see what their own profile looks like to someone else — were exploited by attackers who gained access to the personal information of about 50 million users, among them those of chief executive Mark Zuckerberg and chief operating officer Sheryl Sandberg, the company said on Friday.
Fax machines, which are part of many all-in-one printers, can be compromised over the telephone line and used to attack Windows PCs on the networks to which they are attached, researchers from from security firm Check Point say.
A vulnerability study by security outfit Tenable Research appears to discredit its own work by stating that the sample size it used for the study was not representative.
Cisco has released a flurry of advisories advising of vulnerabilities in its products, with a total of 18 released over the days from 15 May to 17 May.
Vulnerabilities in Adobe's Flash Player took second place to flaws in Microsoft products last year in a list of the most used avenues of attack by cyber criminals compiled by security firm Recorded Future.
Anthony Albanese recently said he reckons Assange has been punished enough. I agree.IMO it’s time for his supporters to cease[…]
I guess we can safely assume they're mining and selling our personal data to others.It's your ABC, but not your[…]
I agree. Not much new in these devices these days, but there is a big market out there for the[…]
Copying Samsung, which also has a A3x, A5x, A7x, A9x line up at similar price points.
Has Jennifer put the Dud in Dudley-Nicholson?