In light of Critical Infrastructure Security and Resilience Month and with the threat of a cyber attack against Critical National Infrastructures (CNI)…
Browsing: Malware and Vulnerabilities
Unfortunately, many organisations see Software Asset Management (SAM) as a compliance reporting tool and little else. This is in some…
In light of today’s news on the Jewson cyberattack, Niall MacLeod, Enterprise Solutions Architect EMEA at Anomali commented below. Niall MacLeod, Enterprise…
Check Point adds new capabilities to SandBlast Mobile Solution in response to increased mobile cyber threats: survey of over 850 firms globally…
Cisco Systems has discovered a critical vulnerability is its Cisco Voice Operating System software that allows an unauthenticated, remote hacker…
Avast have uncovered a new mobile banking trojan in some Google Play apps which has been stealing the banking details of users. As an…
Manoj Asnani, VP Product and Design at Balbix: “Terdot uses two attack vectors to exploit users – phishing and Man-in-the-middle.…
News has just surfaced that Cash Converters has been hit by a data breach. The company reported that it had: “Received an email threat…
Ransomware attack trends will split based on motives Ransomware as a disruptive or destructive attack will increase. Cyber warcraft is…
Nozomi Networks, a company that provides real-time cybersecurity and operational visibility into Industrial Control Networks has comprised the top 5…