By Albert Zhichun Li, Chief Scientist, Stellar Cyber Almost since the beginning of network security, vendors…
Categoría: Hacking
Auto Agregado por WPeMatico
SOCs to Turn to Security Automation to Cope with Growing Threats
Increasingly complex threats, staffing shortages, and rising costs are driving investments in security automation By Chris…
CISA is warning of vulnerabilities in GE Power Management Devices
U.S. Cybersecurity & Infrastructure Security Agency (CISA) warns of flaws in GE Power Management Devices that…
Redefining Digital Risk: 3 Considerations for Your Cybersecurity Strategy in 2021
As we enter a new era of interconnected cybersecurity threats, companies and organizations would be wise…
China-linked APT31 group was behind the attack on Finnish Parliament
China-linked cyber espionage group APT31 is believed to be behind an attack on the Parliament of…
Your Vulnerabilities are Making You Miss Your Misconfigurations
IT organizations regularly configure asset discovery tools in ways that leave them open to abuse by…
Why ‘Thinking Small’ Is the Way to Stop Ransomware and Other Cyber Attacks
By Yuval Baron, CEO at AlgoSec, explains why micro-segmentation is one of the most effective methods…
US DoJ indicted the CEO of Sky Global encrypted chat platform
The CEO of the encrypted communications firm Sky Global has been indicted in the US on…
ProxyLogon Microsoft Exchange exploit is completely out of the bag by now
A security researcher released a new PoC exploit for ProxyLogon issues that could be adapted to…
REvil Ransomware gang uses DDoS attacks and voice calls to make pressure on the victims
The REvil ransomware operators are using DDoS attacks and voice calls to journalists and victim’s business…