#Infosec2025: Cybersecurity Lessons From Maersk’s Former CISO

#Infosec2025: Cybersecurity Lessons From Maersk’s Former CISO

The 2017 ransomware attack on shipping company A P Moller Maersk marked a turning point for the cybersecurity industry, according to its former CISO Adam Banks. The attack is estimated to have cost Maersk $700m, excluding any revenue losses. Following the attack, it was three months before the business was fully back online, Banks told an audience at Infosecurity Europe 2025. But, he said, it could well have been worse. The $700m figure was, Banks…

Read More

VMware Product Release Tracker (vTracker)

VMware Product Release Tracker (vTracker)

This page contains a list of products released by VMware. vTracker is automatically updated when new products are available to download (GA) at vmware.com. If you want to get notified about new VMware Products, subscribe to the RSS Feed. You can also use the JSON export to build your own tool. Feel free to comment when you have any feature requests. 2025-06-04VMware NSX 4.2.2.1 [Release Notes]VMware NSX 4.2.1.4 [Release Notes]VMware NSX 4.1.2.6 [Release Notes] 2025-05-30VMware…

Read More

Researchers Detail Bitter APT’s Evolving Tactics as Its Geographic Scope Expands

Researchers Detail Bitter APT’s Evolving Tactics as Its Geographic Scope Expands

Jun 05, 2025Ravie LakshmananThreat Intelligence / Network Security The threat actor known as Bitter has been assessed to be a state-backed hacking group that’s tasked with gathering intelligence that aligns with the interests of the Indian government. That’s according to new findings jointly published by Proofpoint and Threatray in an exhaustive two-part analysis. “Their diverse toolset shows consistent coding patterns across malware families, particularly in system information gathering and string obfuscation,” researchers Abdallah Elshinbary, Jonas…

Read More

Workday’s new dev tools help enterprises connect with external agents

Workday’s new dev tools help enterprises connect with external agents

For now, Agent Gateway and ASOR only support external agents that are built on vendor platforms in Workday’s Agent Partner Network. Currently, these partners include the likes of Accenture, Adobe, Amazon Web Services (AWS), Auditoria.AI, Compa, Deloitte, Glean, Google Cloud, IBM, Kainos, KPMG, Microsoft, Paradox, PwC, and WorkBoardAI. The Agent Gateway, according to Abhigyan Malik, practice director at Everest Group, is Workday’s way of providing a mechanism that allows for governed, predictable orchestration of AI…

Read More

Why runtime security is the key to cloud protection

Why runtime security is the key to cloud protection

Cloud security teams are caught in an endless cycle. Every day, they sift through alerts, investigate misconfigurations, and analyze theoretical risks. Stymied by information-processing, their nemesis – hackers – don’t wait. Cyber criminals move fast, exploiting live environments while security teams remain buried in posture management and pre-deployment security checks. The problem? “Most cloud security strategies focus on what could go wrong, not what is going wrong right now,” said Bryan Kissinger, PhD, CISO and SVP of Security Solutions at…

Read More

DNS Hijacking, A Major Cyber Threat for the UK Government

DNS Hijacking, A Major Cyber Threat for the UK Government

Cyber threat actors, both nation-state and criminal groups, are actively hijacking internet domains to use them in their malicious campaigns. Nick Woodcraft, Service Owner for Vulnerability Monitoring for the UK Government Digital Service, was invited on a panel at Infosecurity Europe 2025 on June 5. He shared his experience within the UK government to implement measures to protect domains within the .gov.uk DNS namespace, which is a crucial link between the citizens, government employees and…

Read More

#Infosec2025: Ransomware Victims Urged to Engage to Take Back Control

#Infosec2025: Ransomware Victims Urged to Engage to Take Back Control

Opening lines of communication with ransomware actors is the best way to deliver a positive outcome from an event that will be “the worst day of the IT team’s lives,” a leading negotiator has claimed.  Dan Saunders, director of incident response EMEA at Kivu Consulting, revealed that just 30% of the firm’s negotiations with threat actors over the past year have actually led to the victim paying.  “There’s a common misconception around engaging threat actors…

Read More

#Infosec2025: Know Your Audience to Make an Impact, CISOs Warn

#Infosec2025: Know Your Audience to Make an Impact, CISOs Warn

Security leaders must focus and adapt their message to their audience if they are to successfully use risk management to tame a chaotic cyber landscape, a panel of CISOs has argued. On the final day of Infosecurity Europe, security bosses from across LexisNexis and RX Global discussed how CISOs play a vital role as business enablers, and “translators” of risk for senior leadership.  This role has added importance given a landscape in which AI-driven threats,…

Read More

Threat Actors Weaponizing Hardware Devices to Exploit Fortified Enviro

Threat Actors Weaponizing Hardware Devices to Exploit Fortified Enviro

Threat actors are weaponizing legitimate hardware devices to compromise even the most fortified targets, warned Bentsi Benatar, CMO and Co-Founder of Sepio during a talk at Infosecurity Europe 2025. Despite a lack of reporting of such incidents, this approach is being utilized by sophisticated nation-state and financially motivated attackers to target sensitive targets such as banks and energy carriers. This attack vector involves a hardware device being smuggled into an organization and connected to the…

Read More
1 11 12 13 14 15 2,809