Displaying items by tag: attackers

COMPANY NEWS by Greg Wyman, Comodo Security:  COVID-19 has been an incredible opportunity for the attackers and hackers. As home remote working was an absolute game changer and an enabler for the hackers.

Published in Security

GUEST OPINION by Jim Cook, ANZ Regional Director at Attivo Networks: When the global SolarWinds cyberattack came to light earlier this year, it sparked grave concerns across private and public-sector organisations. If attackers could use software from a trusted vendor to breach defences, how could security ever be guaranteed again?

Published in Guest Opinion

2nd edition of annual report provides analysis of 2020 MSP security trends and predictions and recommendations for 2021

COMPANY NEWS: Perch Security, a ConnectWise solution, today announced the release of its 2021 Perch MSP Threat Report.

Published in Security

GUEST OPINION by Jim Cook, ANZ Regional Director, Attivo Networks: With cybercriminals always on the hunt for new ways to mount attacks, organisations are paying more attention to the weaknesses that exist within many deployments of Microsoft’s Active Directory (AD).

Published in Guest Opinion

Cyber security vendor FireEye has a considerable amount of egg on its face after the tools used by its Red Team — an attack unit — have been stolen by a group that it claims is a "highly sophisticated state-sponsored adversary".

Published in Security
Monday, 14 September 2020 06:15

Kaspersky raises the red FUD flag over Linux

Russian security firm Kaspersky has published a blog post about the alleged threat to Linux from targeted attacks and so-called advanced persistent threats — code for state-based actors — that falls squarely into the category known as FUD.

Published in Open Sauce

GUEST OPINION by Greg Wyman, Bufferzone Security:  The world of cyber security has become increasingly complex in past years. Endpoints continue to be the vector that most attackers and hackers use to breach an organisation.

GUEST OPINION by Greg Wyman, Bufferzone Security:  The world of cyber security has become increasingly complex in past years. Endpoints continue to be the vector that most attackers and hackers use to breach an organisation.

Published in Security

WEBINARS ONLINE & ON-DEMAND

GUEST ARTICLES

VENDOR NEWS

Guest Opinion

Guest Reviews

Guest Research

Guest Research & Case Studies

Channel News

Comments