The year of ransomware: Don’t be the next victim

The year of ransomware: Don’t be the next victim

As organizations adjusted to pandemic-induced remote work, cybersecurity experts worried that cybercriminals would take advantage of relaxed security habits, and if that happened, the aftermath could result in massive cyberattacks. Well, during the worst of Covid-19, phishing campaigns skyrocketed, many of them centered on coronavirus concerns, testing, and later, on vaccines. And now we are seeing the impact of those campaigns – a surge in ransomware attacks. Sophos has reported that 51% of organizations worldwide…

Read More

Introduction to heredocs in Dockerfiles – Docker Blog

Introduction to heredocs in Dockerfiles – Docker Blog

Guest post by Docker Community Member Justin Chadell. This post originally appeared here. As of a couple weeks ago, Docker’s BuildKit tool for building Dockerfiles now supports heredoc syntax! With these new improvements, we can do all sorts of things that were difficult before, like multiline RUNs without needing all those pesky backslashes at the end of each line, or the creation of small inline configuration files. In this post, I’ll cover the basics of…

Read More

HTML smuggling is the latest cybercrime tactic you need to worry about

HTML smuggling is the latest cybercrime tactic you need to worry about

It will be hard to catch these smugglers, as they’re abusing an essential element of web browsers that allow them to assemble code at endpoints, bypassing perimeter security. Image: oatawa, Getty Images/iStockphoto Cybersecurity company Menlo Labs, the research arm of Menlo Security, is warning of the resurgence of HTML smuggling, in which malicious actors bypass perimeter security to assemble malicious payloads directly on victims’ machines. Menlo shared the news along with its discovery of an…

Read More

Video management within healthcare: Adding value across the enterprise

Video management within healthcare: Adding value across the enterprise

Video management within healthcare: Adding value across the enterprise | 2021-07-01 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more….

Read More

How hackers used ransomware to undermine healthcare everywhere

How hackers used ransomware to undermine healthcare everywhere

How hackers used ransomware to undermine healthcare everywhere | 2021-07-30 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More

Political violence and resilience: A capital markets solution

Political violence and resilience: A capital markets solution

Political violence and resilience: A capital markets solution | 2021-07-30 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More

5 minutes with Deborah Golden – Establishing trust in the digital identity ecosystem

5 minutes with Deborah Golden – Establishing trust in the digital identity ecosystem

5 minutes with Deborah Golden – Establishing trust in the digital identity ecosystem | 2021-07-30 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie…

Read More

Docker Security Roundup: News, Articles, Sessions – Docker Blog

Docker Security Roundup: News, Articles, Sessions – Docker Blog

With the eyes of the security world converging on Black Hat USA next week, now is a good time to remember that building secure applications is paramount. In the latest chapter in Docker’s security story, Docker CTO Justin Cormack last month provided an important update on software supply chain security. He blogged about the publication of a white paper, “Software Supply Chain Best Practices,” by the security technical advisory group of the Cloud Native Computing…

Read More

IBM Cost of a Data Breach study: Cost of a Data Breach hits record high during pandemic

IBM Cost of a Data Breach study: Cost of a Data Breach hits record high during pandemic

The ‘Cost of a Data Breach’ report commissioned by IBM Security states that the cost of a data breach exceeded $4.2 million during the COVID19 pandemic. IBM Security presented today the annual study “Cost of Data Breach,” conducted by Ponemon Institute and sponsored and analyzed by IBM, which is based on data related to data breaches suffered by over 500 organizations between May 2020 and March 2021. The study highlights the significant impact of the…

Read More
1 2,169 2,170 2,171 2,172 2,173 2,590