Cloud-native watering hole attack: Simple and potentially devastating |
|
08-04-2021 05:12:00 -
https://www.helpnetsecurity.com/2021/04/08/cloud-native-watering-hole-attack/ In this era of increasing technological complexity, watering hole attacks build on a model of simplicity. Just like predatory animals that hover near sources of... |
|
A rush to remote working leaving businesses vulnerable to cybercriminals |
|
08-04-2021 05:00:00 -
https://www.helpnetsecurity.com/2021/04/08/remote-working-cybercriminals/ The COVID-19 pandemic forced businesses to quickly support remote working practices, often without proper security measures in place. Verizon reveals that many businesses may have... |
|
Cybercriminals are using Telegram bots, Google Forms to gather stolen user data |
|
08-04-2021 04:45:00 -
https://www.helpnetsecurity.com/2021/04/08/gather-stolen-user-data/ Cybercriminals are increasingly using legitimate services such as Google Forms and Telegram to gather user data stolen on phishing websites. Alternative ways to collect data... |
|
Businesses shifting to remote work need to focus on securing endpoint devices |
|
08-04-2021 04:30:00 -
https://www.helpnetsecurity.com/2021/04/08/securing-endpoint-devices/ Forrester Consulting conducted a study that shines a light on the increasingly complex realities of digital transformation, its impact on enterprise endpoint security for remote... |
|
Fraudulent purchase attempts value increased 69% in 2020 |
|
08-04-2021 04:00:00 -
https://www.helpnetsecurity.com/2021/04/08/fraudulent-purchase-attempts-value/ The average value of fraudulent purchase attempts increased 69% in 2020, a recent Sift report reveals. Also, several business categories were hit by both major... |
|
68% of construction executives have no cybersecurity measures in place |
|
08-04-2021 03:30:00 -
https://www.helpnetsecurity.com/2021/04/08/construction-executives-cybersecurity-measures/ The construction industry may not appear to be an obvious target for cybercrime, but it garners unwanted online attention just like other sectors. According to... |
|
Financial organizations struggling to secure data in the cloud |
|
08-04-2021 03:00:00 -
https://www.helpnetsecurity.com/2021/04/08/financial-organizations-cloud/ In 2020, the most common incidents that financial organizations suffered regarding data in the cloud were phishing attacks (reported by 26%), targeted attacks on cloud... |
|
nFront Weak Password Scanner helps orgs scan breached passwords |
|
08-04-2021 02:00:00 -
https://www.helpnetsecurity.com/2021/04/08/nfront-weak-password-scanner/ nFront Weak Password Scanner is available for free to companies worldwide allowing them to scan their Active Directory against over 700 million breached passwords in... |
|
Perimeter 81 FWaaS helps organizations scale and protect their expanding perimeters |
|
08-04-2021 01:30:00 -
https://www.helpnetsecurity.com/2021/04/08/perimeter-81-fwaas/ Perimeter 81 announced that it has launched its Firewall as a Service offering (FWaaS), Network Traffic Control (NTC). The new release advances Perimeter 81’s Secure... |
|
Intel launches performance data center platform to power a broad range of workloads |
|
08-04-2021 01:15:00 -
https://www.helpnetsecurity.com/2021/04/08/intel-performance-data-center/ Intel launched its performance data center platform optimized to power the industry’s broadest range of workloads — from the cloud to the network to the... |
|
Optus believes telco customers want the ability to disconnect |
|
08-04-2021 01:15:00 -
https://www.zdnet.com/article/optus-believes-telco-customers-want-the-ability-to-disconnect/#ftag=RSSbaffb68 Telco is adding functionality to its app for customers to pause connectivity to devices.... |
|
Fortanix powers new applications of confidential computing |
|
08-04-2021 01:00:00 -
https://www.helpnetsecurity.com/2021/04/08/fortanix-confidential-computing/ Fortanix announced that its technology is powering new applications of confidential computing. Confidential computing protects applications and the sensitive data they process from unauthorized access... |
|
VMware increases visibility, enables compliance and enhances security for containerized applications |
|
08-04-2021 00:50:00 -
https://www.helpnetsecurity.com/2021/04/08/vmware-cloud-workload-protection/ VMware unveiled expanded cloud workload protection capabilities to deliver security for containers and Kubernetes. The new solution will help increase visibility, enable compliance and enhance... |
|
New Zealand ComCom to consider HP New Zealand resale price maintenance plans |
|
08-04-2021 00:47:00 -
https://www.zdnet.com/article/new-zealand-comcom-to-consider-hp-new-zealand-resale-price-maintenance-plans/#ftag=RSSbaffb68 The New Zealand consumer watchdog will weigh out the pros and cons of giving HP New Zealand the green light to determine the prices of... |
|
OpenNebula 6.0 “Mutara”: Laying groundwork for an integrated and automated enterprise edge cloud |
|
08-04-2021 00:45:00 -
https://www.helpnetsecurity.com/2021/04/08/opennebula-6-0-mutara/ OpenNebula 6.0 “Mutara” is the first stable release of the OpenNebula 6 series, laying the groundwork for the completely integrated and automated enterprise edge cloud.... |
2020-03-04