Cybersecurity and threat news for Europe, the Middle East & Africa
Login
Register
Search
More stories:
06 Jul
Four cyber security principles that withstand the test of time
Information security can be a noisy place. As a career security guy my experiences have given me a deep understanding of attackers & the enterprise.
More
05 Jul
A system wiper with no recourse: Researchers discover what NotPetya attack was really after
ESET senior research fellow Nick FitzGerald says that NotPetya was most likely a state-sponsored attack through malware.
More
05 Jul
Cybersecurity battleground shifting to Linux and web servers - report
WatchGuard found that despite an overall drop in general malware detection for the quarter, Linux malware made up more than 36% of the top threats.
More
04 Jul
Report: Cyber Europe event forged strong EU cooperation in face of simulated cyber attacks
"Cyber Europe 2016 helped participants understand how cybersecurity authorities would cooperate with each other & EU bodies in a large-scale crisis."
More
04 Jul
Gather around the watering hole: Bronze Union attackers likely based in China
The 'active and formidable' Bronze Union group has been responsible for a spate of targeted attacks on Turkey - how do they do it?
More
04 Jul
OceanLotus malware proves that MacOS attackers are rapidly honing their craft
Despite its low profile, the OceanLotus backdoor for MacOS has become more advanced and more targeted than ever before.
More
03 Jul
Encryption with backdoors? Internet advocates call out Five Eyes leaders for 'shortsighted' tactics
Even if measures to restrict strong encryption access are put in place, adversaries will switch to new tools crafted without the Five Eyes network.
More
30 Jun
Corvil integrates with Cisco Tetration Analytics to ramp up data center visibility
“It truly takes an ecosystem to address today’s complex challenges of data center visibility, service assurance, and security."
More
30 Jun
The age of containerisation and its impact on security
A major concern is that enterprise adoption and deployment of DevOps and containers is outpacing the approach used to secure them.
More
28 Jun
Trend Micro launches US$100 million venture fund to harness the IoT wave
Trend Micro’s venture will offer companies financial backing, access to its world-class global threat intelligence, and strategic alliances.
More
28 Jun
Petya ransomworm's rapid spread: What the experts know right now
The Petya ransomware uses the EternalBlue exploit to not only infect files, but an entire system's drive. We get the latest from the experts.
More
27 Jun
How to go threat hunting: The thrill of the hunt
Let’s go threat-hunting. When the hunters and tools have been assembled, let us explore the thought processes that prepare them for a successful hunt.
More
23 Jun
Ovum says security industry 'finally' coming round to automation
Ovum analyst, Rik Turner says the security industry may at last be waking up to automation, probably at its' customers behest.
More
22 Jun
Cisco tackles 'previously unsolvable' challenges with network of the future
Cisco is gaining ground in artificial intelligence for its networking & security solutions, touting it as 'one of the most significant breakthroughs'.
More
21 Jun
The malware that brought down Ukraine – is it really that sophisticated?
Tenable director says the significance of this malware as a stand-alone event is in fact quite small - but vendors have some catching up to do.
More
21 Jun
Gartner reveals the top security technologies in 2017
The top threats and critical areas for protection provide opportunities for managed security service providers and the channel.
More
20 Jun
Palo Alto Networks forms $20m venture fund for budding security vendors
Palo Alto Networks has announced the formation of a $20 million security venture fund for seed, early and growth-stage security companies.
More
20 Jun
Blockchain an inspiring tech for enterprises, but it's attracting hackers too
As blockchain and Bitcoin rocket in value and becomes mainstream across the world, both ISACA and Proofpoint have published advisories.
More
19 Jun
Exclusive: VMware's Bruce Davie explains why network virtualisation is changing security
Security is not about the perimeter any more. Not when you have applications virtualised in the cloud, each with their own policies.
More
19 Jun
Three key security hotspots to consider for your 2018 budget
When budgeting for the 2018 financial year, businesses should look to strengthen cybersecurity defenses in policies, infrastructure & training.
More
19 Jun
It's time for MacRansom: New ransomware goes after MacOS
Fortinet has warned of a Ransomware-as-a-Service (RaaS) that is making its home on a webportal hosted on the TOR network.
More
19 Jun
How to find out the true value of network risk reduction
Networks may make up part of business infrastructure growth, but how do businesses make the most out of any new network & security monitoring tools?
More
19 Jun
Centrify targets local admin access on Macs through latest identity management update
Macs in the enterprise are prone to careless administrative account maintenance and passwords are being shared further than they should be.
More
16 Jun
'Dangerous' Industroyer malware linked to industrial cyber attacks
ESET has posted a warning that critical infrastructure worldwide could be vulnerable to the cybercriminal group Industroyer.
More
14 Jun
Interview: The dark side of biometrics - why social engineering could destroy security
In depth with One Identity: "Anyone who has let a stranger hold an unlocked phone is putting themselves at risk of being breached."
More
13 Jun
DDoS attacks hitting 'record-breaking' levels as volumes increase 380%
DDoS attackers are hitting hard, fast and with no breaks in between, leading to record-breaking attacks over hours or even days.
More
13 Jun
Microsoft uncovers how cybercrime gang uses Intel tech for stealth
Microsoft has uncovered more about cybercrime gang "PLATINUM" group, which now leverages Intel technology to hide its communications.
More
12 Jun
HPE's industry-first puts silicon at the forefront of server security
The industry-first development features embedded silicon-based security into HPE's next-generation ProLiant servers.
More
12 Jun
Impersonation attacks rise 400% as email security struggles to keep up
"If a CISO isn’t reviewing its email security solution on a 12-18 month basis, they may be surprised at what threats are getting into inboxes."
More
08 Jun
Thursdays are the most dangerous days for our inboxes, Proofpoint finds
Be especially wary of the dangers lurking in your inbox on Thursdays - because that's when malicious email attachments are likely to spike.
More
« First
‹ Prev
…
91
92
93
94
95
96
Next ›
Last »