<
>

Posts in Threat detection & defence

CyberSecurity Asean security alert on A Vulnerability in IBM WebSphere Application Server Could Allow for Remote Code Execution

This alert is originally published and can be viewed at https://www.cisecurity.org OVERVIEW: A vulnerability has been discovered in IBM WebSphere Application Server that could allow for...

'Total Economic Impact Study' Confirms BlackBerry Cylance Implementation Delivers 99% Return on Investment

BlackBerry Limited today announced Forrester found that BlackBerry Cylance's AI-driven endpoint security products delivered a 99 percent return on investment. Commissioned by BlackBerry...

Barracuda launches Advanced Bot Protection

Barracuda, a leading provider of cloud-enabled security solutions, today announced the introduction of Advanced Bot Protection. Advanced Bot Protection uses artificial intelligence and...

Teridion Announces Deep Integration with Cisco Meraki MX Security and SD-WAN Appliances to Deliver New High Performance Internet Service

Teridion, the company delivering the only global public cloud-based WAN service, today announced its deep integration with Cisco Meraki MX Security and SD-WAN appliances. The combined solution...

NSFOCUS Unveils 7Tbps Cloud DDoS with Bigger Capabilities and Better Mitigation to Proactively Protect Organisations from the Most Determined Threat Actors

NSFOCUS, the leader in holistic hybrid security solutions, today announced the launch of its 7Tbps Cloud Distributed Denial-of-Service (DDoS) Protection helps organisations to cope with the...

Domain Spoofing Explained

What is Domain Spoofing? Domain spoofing is a form of online fraud or phishing technique whereby cybercriminals impersonate a company or its employees using a fake domain that appears similar...

CyberSecurity Asean security alert on A Vulnerability in Oracle WebLogic Could Allow for Remote Code Execution

This alert is originally published and can be viewed at https://www.cisecurity.org OVERVIEW: A vulnerability has been discovered in the Oracle WebLogic that could allow for remote code...

Business Email Compromise Explained

What is Business Email Compromise? Business Email Compromise (BEC) refers to fraudulent emails used by cybercriminals to imitate the identity of another party or person in order to scam or defraud...

Escalating Cyber Risks and Failure to Prioritise Cybersecurity Hampering Digital Transformation Efforts in APAC

During a partners and media conference held in Kuala Lumpur this week, Forcepoint unveiled the findings of an Asia Pacific (APAC) study conducted by IT analyst firm Frost & Sullivan, revealing...

CyberSecurity Asean security alert on Multiple Vulnerabilities in Juniper Junos OS Could Allow for Remote Code Execution (2019-04)

This alert is originally published and can be viewed at https://www.cisecurity.org   OVERVIEW: Multiple vulnerabilities have been discovered in Juniper Junos OS, the most severe of...

Pages

Subscribe to RSS - Threat detection & defence