防风险勿忘 强化网络安全
近年来,区块链、人工智能等新兴网络技术不断兴起,科技正更多地应用到金融行业。金融科技的大力发展和应用在提高金融效率、满足金融需求和促进金融行业更好服务实体经济的同时,也使得金融系统易成为网络攻击的重点对象,大大增加了潜在的系统性风险。...
View ArticleResearchers Uncover Massive Malvertising Operation
While analyzing recent drive-by download attacks, security researchers have uncovered a large malvertising operation that infiltrated the legitimate online ad ecosystem and abuses more than 10,000...
View ArticleNetgear launches Armor service to protect your home’s networked devices
Netgear is launching a new serviced dubbed Netgear Armor to protect your home’s networked devices. Powered by Bitdefender , the Netgear Armor service can provide network security for any device...
View ArticleJuly Vulnerability of the Month: Two Zero-Days Caught in Development
An Adobe Reader double free vulnerability on windows and macOS systems earns the nod for its interesting discovery and patch story. Novelty, sophistication or just plain weirdness are some of the...
View ArticleAZORult Version 3.2 Spyware More Abusive Than Ever
AZORult is an information stealer and downloader designed to harvest various sensitive details from the systems it compromises. The malware was first identified in 2016 when it was distributed as a...
View ArticleResearchers find tons of red flags in Bitfi’s ‘unhackable’ cryptocurrency wal...
Last week, John McAfeeoffered up $100,000 to anyone who could break into the Bitfi wallet a device advertised as the world’s first completely “unhackable” cryptocurrency wallet. Bitfi even asked that...
View ArticleProtego Labs and Mode2 to Provide Serverless Security to U.S. Cloud Customers
Strategic Partnership Created as Market Demand for Serverless Accelerates Baltimore, MD July 31, 2018 Protego Labs today announced that it has signed a strategic partnership with Mode2, a cloud native...
View ArticleEnhance Your Digital Security: 7 Things You Need to Keep Updated
There are numerous basics you need in order to protect yourself from cybercriminals. A strong security suite is essential, for instance, as is making regular backups. And you definitely need to accept...
View ArticleCarphone Warehouse Data Breach: The Security Experts Respond
Add to favorites “1.2 million… we mean 10 million” Last year’s Carphone Warehouse data breach was worse than the company thought: nine million people worse, the company announced on Monday. CEO Alex...
View ArticleEndace and Ixia, a Keysight Business, Partner to Secure and Monitor Networks
Joint solutions will deliver new levels of visibility into network activity, even inside encrypted traffic London, UK - July 31, 2018- Endace, a world leader in high-speed network recording, playback...
View ArticleOne-of-a-Kind HP Printer Bug Bounty to Improve Network Security
Printers are often the weakest link in an organization, with printer vulnerabilities being exploited in various malicious campaigns to compromise entire networks. One such vulnerability was disclosed...
View ArticleExadata Security: the joy of PXE and UEFI: Secure boot violation
As usual, Andy was right. Trying to boot one of the cells on the pxe “the old method” resulted in: “ Secure boot violation: Invalid signature detected. Check Secure boot policy in setup ” So … we now...
View ArticleThe Quantum Race: Roundup on Quantum Cryptosecurity, Programming Languages,...
The space race of the cold war saw the US and Russia develop a wide range of aerospace technologies. But a new race is about to begin, mostly among corporations, and the winner will unlock the power of...
View ArticleMimecast Snaps Up Solebit for $88 Million
Purchase of threat detection firm closely follows company's acquisition of security training platform Ataata. Email and data security firm Mimecast has agreed to buy threat detection company Solebit...
View ArticleSkysense and Avansig partner to develop world's first autonomous indoor drone...
E uropean tech companies have partnered topower the first ever indoor autonomous surveillance drone for international security company Prosegur. Berlin-based tech companySkysense last week entered...
View ArticleWhat is the NIST Cybersecurity Framework?
You’ve SOC 2 -ed from here to eternity, and you’ve got GDPR in the bag, but if you’re truly focused on security maturity, you know that your work is never done. So, what’s next? Perhaps it’s time to...
View ArticleYale Discloses Data Breach
The university discloses that someone stole personal information a long time ago. Yale University has just disclosed that it suffered a data breach including names, Social Security numbers, dates of...
View ArticleIstio reaches 1.0: ready for prod
Today, Google Cloud is proud to announce, together with our collaborators, that the Istio open-source project has reached the 1.0 milestone . This is a key step toward delivering the Cloud Services...
View ArticleHow Microsoft 365 Security integrates with your broader IT ecosystem―part 2
Todays post was coauthored by Debraj Ghosh, Senior Product Marketing Manager, and Diana Kelley, Cybersecurity Field CTO. In part 1 of our blog series, we shared the Microsoft 365 Security strategy for...
View ArticleThreat Hunting for Anomalies in Privileged Account Activity
Introduction A tell-tale sign of your network being hacked is that a privileged account, such as a system administrator account, has been compromised. Attacks of this kind can come from anyone either a...
View Article