Ransomware Task Force Releases its Comprehensive Framework for Action

Since ransomware’s introduction in 1989 in the form of the AIDS Trojan, also known as PS…

Naikon APT group uses new Nebulae backdoor in attacks aimed at military orgs

China-linked APT Naikon employed a new backdoor in multiple cyber-espionage operations targeting military organizations from Southeast Asia in…

Boffins found a bug in Apple AirDrop that could leak users’ personal info

Experts found a bug in Apple’s wireless file-sharing protocol Apple AirDrop that could expose user’s contact…

Digital Estate Planning – What to Do With Your Digital Assets

While we’re enjoying the fruits of digital life—our eBooks, movies, email accounts, social media profiles, eBay…

New Security Approach to Cloud-Native Applications

With on-premises infrastructure, securing server workloads and applications involves putting security controls between an organization’s network…

You Don’t Have to Give Up Your Crown Jewels in Hopes of Better Cloud Security

If you’re like me, you love a good heist film. Movies like The Italian Job, Inception,…

3 Zero-Day in SonicWall Enterprise Email Security Appliances actively exploited

Security vendor SonicWall has addressed three zero-day vulnerabilities affecting both its on-premises and hosted Email Security products. SonicWall…