NSA-Style Backdoor Found In Huawei Laptops

CISO Belong in the Corporate World?

Following the news that Microsoft researchers have found an NSA-style backdoor in Huawei laptops, Oleg Kolesnikov VP of Threat Research and Head of Research Labs at Securonix commented below.  Oleg Kolesnikov, VP of Threat Research and Head of Research Labs at Securonix: “While there currently is no direct evidence that the software security issues were […]

vxCrypter: The First Ransomware To Delete Duplicate Files

unmanaged contents

The vxCrypter Ransomware could be the first ransomware infection that not only encrypts a victim’s data, but also tidy’s up their computer by deleting duplicate files.     When the ransomware was first tested, it deleted every file in a folder except for one.  As this ransomware was still being developed, it was assumed that this was just a bug […]

Information-Harvesting Software Widespread On Irish Government Websites

Tips for Parents on How to keep their Little Gamers Safe?

Software used to harvest potentially sensitive information about users is widespread across the websites of government departments and local authorities, The Irish Times has revealed.   New research shows that almost all of the 16 departmental and 31 local authority websites surveyed had “trackers” installed, which help companies compile detailed profiles of users. The research, by Danish ePrivacy firm Cookiebot, scanned […]

85 Percent Of Organizations Fail To Meet Basic Level Of PAM Maturity

Thycotic’s 2019 State of Privileged Access Management Maturity Report Reveals Alarming Shortcomings in PAM Security Practices  Thycotic, a provider of privileged access management (PAM) solutions to 10,000 organizations worldwide, today announced its 2019 State of PAM Maturity Report. The report summarizes the aggregate data from more than 450 organizations across the globe that participated in Thycotic’s Q4 2018 PAM Maturity […]