Virgin Active SA Suffers Cyber-Attack

Virgin Active SA Suffers Cyber-Attack

The South African arm of fitness group Virgin Active has been targeted by “sophisticated cyber-criminals.” The company took all its computer systems offline after being targeted by cyber-criminals on Thursday. Late on Friday, Virgin Active warned clients of the attack by posting a message on its website. “Virgin Active South Africa became aware of a cyberattack yesterday and our security teams immediately started working with cybersecurity experts to carefully contain, manage and investigate the cyber…

Read More

Community Rooms at DockerCon LIVE 2021 – Docker Blog

Community Rooms at DockerCon LIVE 2021 – Docker Blog

The Docker community spans the four corners of the world. To celebrate the global nature of our community at DockerCon this year, we’ve created something new: Community Rooms. Building on the learnings of our “regional rooms experiment” during our last Community All-Hands, Community Rooms are virtual spaces that DockerCon attendees will be able to join to discuss, share and learn about Docker in their own language and/or around a specific topic area.  100% LIVE The…

Read More

Third Parties Caused Data Breaches at 51% of Organizations

Third Parties Caused Data Breaches at 51% of Organizations

Remote access is becoming an organization’s weakest attack surface, according to new research published today by the Ponemon Institute and third-party remote access provider SecureLink. The new report, titled “A Crisis in Third-party Remote Access Security,” reveals a disparity between an organization’s perceived third-party access security threat and the protective measures it puts in place.  Researchers found that organizations are exposing their networks to non-compliance and security risks by not taking action to reduce third-party access risk.  Nearly half (44%) of…

Read More

Building Hybrid Work Experiences: Details Matter

Building Hybrid Work Experiences: Details Matter

The Shift From Remote Work to a New Hybrid Work Environment It’s exciting to see more organizations start to make the shift from remote work to a new hybrid work environment, but it’s a transition that comes with a new set of questions and challenges. How many people will return to the office, and what will that environment look like? Increasingly, we’re hearing that teams are feeling fatigued and disconnected – what tools can help…

Read More

Facebook: Don’t expect full end-to-end encryption on Messenger until 2022 ‘at the earliest’

Facebook: Don’t expect full end-to-end encryption on Messenger until 2022 ‘at the earliest’

Facebook says it wants to make E2EE the default across all of its messaging platforms, but this will be a gradual process. Facebook Messenger won’t be encryption until at least next year. Image: James Martin/CNET Facebook has pledged to make end-to-end encryption (E2EE) the default across all of its messaging services – though has told users not to expect it on Facebook Messenger or Instagram Direct until 2022 “at the earliest”. Gail Kent, Facebook’s policy…

Read More

Anomali Cyber Watch: Microsoft Office SharePoint Servers Targeted with Ransomware, New Commodity Crypto-Stealer and RAT, Linux Backdoor Targeting Users for Years, and More

Anomali Cyber Watch: Microsoft Office SharePoint Servers Targeted with Ransomware, New Commodity Crypto-Stealer and RAT, Linux Backdoor Targeting Users for Years, and More

The various threat intelligence stories in this iteration of the Anomali Cyber Watch discuss the following topics: Data Theft, Backdoor, Ransomware, Targeted Ransomware Attacks and Vulnerabilities. The IOCs related to these stories are attached to Anomali Cyber Watch and can be used to check your logs for potential malicious activity. Figure 1 – IOC Summary Charts. These charts summarize the IOCs attached to this magazine and provide a glimpse of the threats discussed. Trending Cyber…

Read More

Cisco adds to its Catalyst software stack for back-to-work safety

Cisco adds to its Catalyst software stack for back-to-work safety

Cisco has taken the wraps off a technology package it says will utilize existing core wireless and wired systems to help enterprises better control their physical environments and enable a safer, more secure return to the office. While supporting remote offices and branches of one—IDC says that post-COVID, more than 52% of workers will either remain remote or hybrid—they rest could return to an altered business space.   In these offices, sensors and devices that…

Read More

Unlocking technical enablement for partners with SRE Labs – Cisco Blogs

Unlocking technical enablement for partners with SRE Labs – Cisco Blogs

In today’s digital economy, technology is changing by the second. But when security, connectivity, and automation are a business’ top priorities, it’s important for your IT team to be one step ahead, fully equipped with the knowledge, skillset, and tools needed to adapt to and overcome what’s on the horizon. Cisco’s Solutions Readiness Engineering (SRE) provides a hands-on approach to developing technical enablement for teams — one that’s custom-built to suit partners’ needs. Whether they’re…

Read More

Fraudulent Apps that Automatically Charge you Money Spotted in Google Play

Fraudulent Apps that Automatically Charge you Money Spotted in Google Play

Google’s Android operating system has been a boon for the average consumer. No other operating system has given so much freedom to developers and hardware manufacturers to make quality devices at reasonable prices. The number of Android phones in the world is astounding. That success comes with a price, however. A recent report from our own McAfee Mobile Research team has found malicious apps with hundreds of thousands of downloads in the Google Play store. This round of apps poses…

Read More

Fraudulent Apps that Automatically Charge you Money Spotted in Google Play | McAfee Blogs

Fraudulent Apps that Automatically Charge you Money Spotted in Google Play | McAfee Blogs

Google’s Android operating system has been a boon for the average consumer. No other operating system has given so much freedom to developers and hardware manufacturers to make quality devices at reasonable prices. The number of Android phones in the world is astounding. That success comes with a price, however. A recent report from our own McAfee Mobile Research team has found malicious apps with hundreds of thousands of downloads in the Google Play store. This round of apps poses…

Read More
1 3,401 3,402 3,403 3,404 3,405 3,564