Despite Patches, Adobe ColdFusion’s Critical Vulnerabilities Are Still Used
Fortinet has noted growing threat exploitation aimed at the web development platform Adobe ColdFusion. This is in spite of Adobe releasing a number of security upgrades (APSB23-40, APSB23-41, and APSB23-47) in response to reports of!-->…
The Gender Gap in Cyberspace is Growing – What Are Our Options?
An unsettling number was found by the UK Government's recent examination of cybersecurity skills in the labor market: women now make up only 17% of the cyber workforce, down from 22% the year before. The persistent skills gap in the!-->…
GRU Blamed for Infamous Chisel Malware Targeting Ukraine’s Military Phones
The UK and its Five Eyes partners (Australia, Canada, New Zealand and the US) officially support Ukraine’s attribution of Infamous Chisel, a new piece of malware infecting Ukraine’s military personnel’s mobile phones, to the Main!-->…
Wiz and Carahsoft Team Up to Bring the Public Sector Industry-Leading Cloud Security Solutions
Today, a partnership was announced between Wiz, the top cloud security platform that gives users complete visibility into their important cloud threats, and Carahsoft Technology Corp., The Trusted Government IT Solutions Provider®. In!-->…
How Organizations Are Streamlining Server Virtualization
Virtualization transforms enterprise IT, increasing productivity, lowering costs, and improving business continuity. This infographic explores adoption data on server virtualization and how it’s growing, the importance of containers, and!-->…
Migrating to The Cloud
The cloud is an excellent alternative to an abundance of expensive and complicated on-premises solutions; however, it is far from a simple turnkey experience. Getting the most out of your cloud solution requires finding the right provider,!-->…
FBI-Led Operation Duck Hunt Shuts Down QakBot Malware
The FBI has led a multinational law enforcement operation that has successfully dismantled QakBot, a leading malware loader used by cybercriminals to deploy ransomware.
As part of Operation Duck Hunt, the FBI gained access to QakBot’s!-->!-->!-->…
Google Cloud Security Whitepapers
Google has a global-scale technical infrastructure designed to provide security through the entire information processing lifecycle. This infrastructure provides secure deployment of services, secure storage of data with end user privacy!-->…
Exposing Malware in Linux-Based Multi-Cloud Environments
90% of cloud runs on Linux, but current countermeasures are focused on addressing Windows-based threats, leaving multi-cloud deployments vulnerable to attacks. So, is it any wonder that malware is propagating in multi-cloud environments!-->…
Axcient Receives 2023 Cloud Security Excellence Award
Axcient, a leader in business availability software for Managed Service Providers (MSPs), today announced its Business Continuity and Disaster Recovery (BCDR) solution x360Recover received the 2023 Cloud Security Excellence Award by Cloud!-->…
Microsoft Warns of Adversary-in-the-Middle Uptick on Phishing Platforms
Microsoft has observed a proliferation of adversary-in-the-middle (AiTM) techniques deployed through phishing-as-a-service (PhaaS) platforms, the company explained in a series of tweets posted on August 28, 2023. On the one hand, there has!-->…
Labelbox Joins Cloud Security Alliance
Labelbox has announced today that it has joined the Cloud Security Alliance (CSA), the world's leading organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing environment.
!-->!-->!-->…
VIRTUALIZING HIGH-PERFORMANCE COMPUTING (HPC) ENVIRONMENTS
This document is intended for virtualization architects, IT infrastructure administrators, and HPC systems administrators who intend to design, deploy, and maintain vHPC workloads. These IT professionals are generally new to either HPC or!-->…
The evolution of hybrid cloud management
As cloud has moved from the leading edge to the mainstream, the requirements for cloud management have evolved. Enterprises need an agile framework that will allow them to integrate multiple cloud environments seamlessly and update them!-->…
Web Application Security for Pharma and Healthcare
COVID-19 has put the industry under exponential strain, as we see a surge in ransomware attacks. This attack surface study examines the unique internet exposure and application vulnerabilities of the top pharma and healthcare!-->…
Researchers Discover Reply URL Takeover Issue in Azure
Security researchers are urging Azure Active Directory (AD) users to monitor for abandoned reply URLs after revealing a critical vulnerability in the Microsoft Power Platform.
Secureworks said it discovered the reply URL takeover bug!-->!-->!-->…
Privacy Regulator Warns of Surge in “Text Pest” Cases
The UK’s data protection watchdog is urging victims of so-called “text pests” to come forward after revealing that nearly a third (29%) of 18- to 34-year-olds have had their personal information misused.
Text pest cases occur when an!-->!-->!-->…
Teens Found Responsible For Lapsus$ Cyber-Attacks
An Oxford teenager has been found guilty of a series of hacking incidents impacting big-name brands, as part of the infamous Lapsus$ group.
Arion Kurtaj, 18, is autistic and was deemed by psychiatrists to be unfit to stand trial.!-->!-->!-->…
Transmute Platform
Modern application development is powered by a fusion of servers, databases, and programs hosted on centrally managed public and private clouds. Many enterprises and small businesses have migrated on-premise solutions to Amazon, Microsoft,!-->…
3 Steps to Better Cloud Performance
While they don’t hold a crystal ball, enterprise CTOs and CIOs are expected to predict and prepare for future connectivity needs with tremendous accuracy. This is beyond tricky. Serving many lines of business, departments and demands—all!-->…
Steps to Get Ahead of Insider Threats
In the current insider threat landscape, security and risk management leaders have a greater need to assess and manage insider risks. They must evaluate and strengthen their insider risk program, including surveillance of high-risk workers!-->…
UnifyCloud Enhances CloudAtlas Software to Facilitate and Accelerate Seamless Migration to Google…
UnifyCloud, a global ISV and cloud solutions provider focused on simplifying and accelerating modernization and digital transformation, today announced the integration of Google Cloud into its CloudAtlas platform. As a Google Cloud!-->…
An Intelligence Perspective on Insider Threats
Insider threat is a well-known phenomenon that is considered by most to be the greatest threat to any information security environment. Access control measures attempt to mitigate much of this through physical (hardware) and software-based!-->…
Ivanti Warns of Critical New Zero-Day Bug
Security vendor Ivanti has urged customers to urgently remediate a newly discovered zero-day vulnerability in its Ivanti Sentry product. Formerly known as MobileIron Sentry, Ivanti Sentry is a secure mobile gateway designed to manage,!-->…
New APT Group Launches Supply Chain Campaign
A newly discovered APT group has been spotted using commercial software to deploy backdoor malware to targeted victims in Hong Kong and elsewhere in Asia.
Symantec revealed in a new report today that although use of the Korplug backdoor!-->!-->!-->…
Key Steps for Implementing Cloud Security Automation
Efficiently defend against threats with the implementation of cloud security automation. Safeguard the enterprise cloud with these steps to automate and remediate.
The Goldilocks Zone: Cloud Workload Protection
In the future, the Tetration Analytics platform will programmatically integrate with VirusTotals: pull data and push data to it. It will exchange its verdict on the process hash and programmatically consume verdicts from other security!-->…
SOCi Debuts in AWS Marketplace
SOCi Inc., a leading CoMarketing Cloud for multi-location enterprises, today announced the availability of its platform in AWS Marketplace, a digital catalog with thousands of software listings from independent software vendors that make!-->…
Why we Need to Manage the Risk of AI Browser Extensions
AI has been around for decades. But the remarkable ascent of ChatGPT over recent months has propelled the technology fully into mainstream consciousness. It’s also elevated the conversation for IT security leaders about what represents!-->…
How to Capitalize on Market Growth in Network Security
As innovation accelerates and the exposure to sophisticated digital attacks grows, demand for network security solutions is exploding and driving investment into the sector. Analysts agree that there is a huge opportunity for growth in!-->…
UK’s AI Safety Summit Scheduled For Early November
The UK’s much-anticipated summit on AI safety will reportedly be held in November, with cybersecurity experts welcoming the government’s focus on regulating emerging technologies.
A Downing Street spokesperson confirmed the event will!-->!-->!-->…
Why it’s Time to Re-think your PKI
There’s no doubt that public key infrastructure (PKI) is an essential component of your cybersecurity toolset – the issue is that many teams continue to rely on outdated and disparate PKI infrastructure that creates more complexity and!-->…
SASE Security Buyers Guide
As workers return to on-site work-safely and while many organizations remain remote, consistently connecting dispersed workforces to the data they need has become a challenge.
Many organizations are uncertain if secure access service!-->!-->!-->…
CISA Urges Patching of Actively Exploited Citrix Bug
The US Cybersecurity and Infrastructure Security Agency (CISA) has warned that a Citrix flaw patched in June is being actively exploited in the wild. CVE-2023-24489 was added to the agency’s Known Exploited Vulnerabilities Catalog!-->…
Defending Data Against Ransomware
Learn how to protect your data, even in worst-case scenarios, with this white paper that talks through benefits of software and hardware precautions to take. With increased occurrences in cyber-attacks and ransomware crime, it’s never been!-->…
Businesses Need Managed File Transfer
Compared to using a variety of standalone FTP and SFTP tools, MFT technology allows professionals to streamline how data is transferred. This helps organizations do things like send and receive files in their cloud and private networks,!-->…
Discord.io Halts All Operations After Massive Data Breach
The third-party service is not an official Discord website, but allows server owners to create custom invites to their Discord channels. Discord.io added that it has canceled all active subscriptions and will be reaching out to individual!-->…
Reduce downtime in ICS & OT from days and weeks to minutes
In an increasingly interconnected world, critical infrastructures such as power grids, transportation networks, and water treatment facilities have become attractive targets for cybercriminals. Since cyber-attacks have become inevitable,!-->…
A Cyber-Hygiene Checklist
The calls for cyber-hygiene are getting stronger with each passing year. That’s down to several factors.
First, the cyber-attack surface is growing exponentially, thanks to pandemic-era investments in cloud-based technologies and!-->!-->!-->…
Microsoft: Critical CODESYS Flaws Could Shut Down Power Plants
Microsoft researchers have identified multiple high-severity vulnerabilities that could enable threat actors to shut down power plants. The flaws were discovered within the CODESYS software development kit (SDK), which is widely used to!-->…
Get a Clear Path to SAP HANA in the Cloud
Big changes are on the horizon for many SAP HANA users. Today’s cloud computing capabilities can help ease the upcoming transition by securely and cost-effectively supporting HANA and your other SAP applications. SUSE and Microsoft Azure!-->…