Blog

30 Results / Page 1 of 3

todayAugust 28, 2021

  • 19
close

Cyber security Remote Users

Librem 5

This product is recommended by us for those that want a little more control over their software operational switches. Software Managed phones like Android or IOS devices, can be infected or remotely configured to switch on certain key services like WiFi or Bluetooth, these phones from Purism enable the owner ...

todayApril 24, 2019

  • 235
  • 198
close

Ransomware Remote Users

SpeakUp Linux Backdoor targets Linux servers in East Asia and LATAM

Malware researchers at Check Point have spotted a new Linux backdoor dubbed ‘SpeakUp’ targeting servers in East Asia and Latin America, The SpeakUp backdoor leverages known vulnerabilities in six different Linux distros, it is also able to infect Mac systems. The Trojan spread by exploiting remote code execution flaw and for the initial ...

todayApril 24, 2019

  • 88
  • 171
close

Cybercrime Remote Users

Mid-Market Businesses, Don’t Think Small about Security

DHS has issued a notice of a CISA emergency directive urging federal agencies of improving the security of government-managed domains (i.e. .gov) to prevent DNS hijacking attacks. The notice was issued by the DHS and links the emergency directiveEmergency Directive 19-01titled “Mitigate DNS Infrastructure Tampering.” “In coordination with government and ...

todayApril 24, 2019

  • 84
  • 141
close

Cyber security + Global news Remote Users

DHS issues emergency Directive to prevent DNS hijacking attacks

U.S. Department of Homeland Security Issues Emergency Directive on DNS Hijacking Attacks January 23, 2019 Scott Carter The U.S. government may be shut down, but cyber criminals aren’t. Yesterday, the Department of Homeland Security issued an emergency directive to civilian agencies that requires immediate action to mitigate the impact of ...

todayApril 24, 2019

  • 72
  • 95
close

Cybercrime Remote Users

The 5 Most Cringe-Worthy Privileged Data Breaches of 2018

Privileged attack vectors and stolen personally identifiable information (PII) obtained have been a constantly paired news item throughout 2018. In 2019, expect privileged attack vectors to continue to reign as the number one root cause of breaches for both consumer and business data theft. Below, I have compiled my list ...

todayApril 24, 2019

  • 94
  • 103
close

Whitepapers Remote Users

Overcoming the Cyber-security Staffing Drought

Companies won’t ever be able to hire enough qualified pros. Partnering with full-service cybersecurity providers is now a viable alternative. Introduction Whether you’re responsible for managing IT security at a large multinational corporation with facilities spread across the globe or at a startup in Boulder or Beaufort, chances are your ...

todayApril 24, 2019

  • 82
  • 190
close

Blockchain Remote Users

Five Strategies to Optimize Cloud Security in 2019

1 – Address Limited Visibility With the rapid rise of cloud technology and DevOps practices, some security teams attempt to minimize risk by limiting the speed of change. Though minimizing risk is a valid goal, this method fails to address extremely fast-moving, technology-dependent business requirements and, as a result, in-cloud ...

todayApril 24, 2019

  • 72
  • 184
close

Ransomware Remote Users

Top 10 Business Requirements for an Enterprise Cyber Threat Hunting Solution

A cyber threat hunting solution should not simply be another layer of real-time detection. There are significant differences in the goals of a real-time detection tool (like antivirus) and a pure threat hunting solution. This article explores the top ten business requirements for selecting an enterprise cyber threat hunting solution. ...

todayApril 24, 2019

  • 81
  • 124
close

Blockchain Remote Users

Operators of the TheMoon botnet offer it as a service

Originally identified in 2014, TheMoon botnet is configured to look for flaws on the router set up by organizations like ASUS, D-Link, Linksys, and MikroTik. The proxy botnet had been employed by the botnet operators for a number of reasons; video advertisement fraud, general traffic obfuscation, and brute force, to ...


  • – Email Address Hidden


Products


Company


Contacts

Support