<
>

Posts in Cyber Safety

One Click Can Destroy Your Identity

Author:  Morey Haber, CTO and CISO at BeyondTrust   Everyone makes mistakes. Whether we admit them or not is shrouded in honesty, ego, and ethics, but yet we all make them. Some of...

Citrix and FireEye Mandiant Launch a New Tool to Detect Potential Compromise

The launch of a new tool for detection of compromise in connection with the previously announced CVE-2019-19781 vulnerability, which affects certain versions of Citrix Application Delivery...

Quantum Announced New Highly-Secure, Off-Line Protection Against Ransomware

Quantum Corp. announced new Ransomware Protection Packs to provide a simple and easy-to-implement solution for securing critical off-line data from ransomware attacks. Each pre-defined...

Microsoft breach affects 250 million records

Microsoft announced a data breach had affected one of its customer databases. According to a blog post entitled Access Misconfiguration for Customer Support, Microsoft had a breach between 5th...

SANS Released SANS 2020 Cybersecurity Spending Survey

According to results of the SANS 2020 Cybersecurity Spending Survey to be released by SANS Institute in webcasts on January 29 and January 30, 2020, the rapid migration to cloud-based...

Black Hat Asia 2020

Black Hat Asia returns to the Marina Bay Sands in Singapore, March 31-April 3, 2020. InfoSec professionals from around the world gather for a range of highly-technical Trainings and thought-provoking...

Hacker Leaks Passwords for Over 500,000 Servers, Routers and IoT Devices

ZDNet recently reported that a hacker had published a massive list of Telnet credentials for more than 500,000 servers, routers and IoT devices on the dark web in what could be the largest known leak...

Kaspersky Data Shows Malaysia Q4 2019 Cyberthreats Heading to Downward Trend

Kaspersky has detected 11,544,340 local threats on the computers of Kaspersky Security Network (KSN) participants in Malaysia, over the period of October to December of 2019. During this period,...

3 ways Hacker Powered Security helps the agile CISO

By: Rena Chua, Bug Bounty Advisor at HackerOne Security teams are challenged by the radical shifts in software development, from the fast pace and frequent releases to new languages and...

FireEye Launches Cloud Security Assessments and Cyber Defense Operations

FireEye, Inc., the intelligence-led security company, has announced the availability of two new FireEye® Mandiant® services. Cloud Security Assessments provide organisations with...

Pages

Subscribe to RSS - Cyber Safety