New Security Approach to Cloud-Native Applications | McAfee Blogs

New Security Approach to Cloud-Native Applications | McAfee Blogs

With on-premises infrastructure, securing server workloads and applications involves putting security controls between an organization’s network and the outside world. As organisations migrate workloads (“lift and shift”) to the cloud, the same approach was often used. On the contrary to lift and shift, many enterprise businesses had realized that in order to use the cloud efficiently they need to redesign their apps to become cloud-native. Cloud native is an approach to building and running applications that exploits…

Read More

Phishing attacks target Chase Bank customers

Phishing attacks target Chase Bank customers

Two email campaigns discovered by Armorblox impersonated Chase in an attempt to steal login credentials. Image: Tim Clayton/Corbis Sport/Getty Images Have you ever received an email apparently from your bank claiming that there was something wrong with your account? Even those of us savvy enough to watch for malicious messages and scams may pause for a moment, concerned that this warning just might be legitimate. And that’s when criminals hope you’ll take the bait. SEE: Social…

Read More

Why hackers are increasingly targeting video game companies

Why hackers are increasingly targeting video game companies

The targets of the latest attacks are C-suite executives in the video game industry, says BlackCloak. scyther5, Getty Images/iStockphoto Any organization can be vulnerable to cyberattack. But some have proved to be susceptible, especially over the past year as the coronavirus pandemic has wreaked havoc with traditional work environments. A report released Tuesday by cybersecurity provider BlackCloak describes how cybercriminals have been targeting the video game industry and key executives. SEE: Video game career snapshot: Industry…

Read More

Linux kernel security uproar: What some people missed

Linux kernel security uproar: What some people missed

Commentary: It’s not really very interesting that University of Minnesota researchers introduced bugs into the Linux kernel. What matters is what would have happened next. Image: iStockphoto/Igor Kutyaev Recently the Linux kernel community was aflame due to efforts by researchers at the University of Minnesota to intentionally torpedo Linux security by submitting faulty patches. While the University’s Department of Computer Science apologized, the damage was done, and Linux kernel maintainer Greg Kroah-Hartman banned the University…

Read More

Parents Should Take Action to Protect Their Children from Cyber-Risks

Parents Should Take Action to Protect Their Children from Cyber-Risks

Actions parents can take to protect their children from growing cyber-risks were highlighted during a webinar organized by Menlo Security and featuring insights from Nina Bual, co-author & CEO, Cyber Lite Ready, Get Set, CONNECT! Interactive Workbook. Mike East, vice president, EMEA at Menlo, began by highlighting the expansion of the internet, which, while enriching, “sadly also we have to be painfully aware that not everything on the internet is good, and there is quite a…

Read More

REvil Removes Apple Extortion Attempt from Site: Report

REvil Removes Apple Extortion Attempt from Site: Report

A ransomware group that claimed to have Apple trade secrets in its possession after compromising a supplier has reportedly deleted all mention of the extortion attempt from its dark web site. It emerged last week that the notorious REvil group had managed to steal some schematics for Macbooks from one of Apple’s main manufacturing partners, Quanta Computer. Reports claimed that, as the Taiwanese firm refused to pay a $50 million ransom to get the stolen…

Read More

VMware Paves a Path for Radio Access Network Modernization

VMware Paves a Path for Radio Access Network Modernization

News Detail VMware Telco Cloud Platform RAN Extends the Benefits of Network Disaggregation and Virtualization from the Core to the RAN PALO ALTO, Calif.–(BUSINESS WIRE)– Communication service providers (CSPs) are modernizing their networks as quickly as they can to bring new 5G services to customers. First with the core—the heart of the network. And now further out to the edge. They want to bring the … Tue, 27 Apr 2021 00:00:00 VMware Telco Cloud Platform…

Read More

Private Equity Giant Snaps Up Proofpoint for $12.3 billion

Private Equity Giant Snaps Up Proofpoint for .3 billion

Proofpoint is set to become the latest cybersecurity acquisition of private equity giant Thoma Bravo after a $12.3 billion deal was announced yesterday. The all-cash deal will see Proofpoint shareholders receive $176 per share in cash, around a third more than the firm’s closing price on Friday. The two parties are claiming that, following the deal, Proofpoint will benefit from the “flexibility” of being a private company and from the “operating capabilities, capital support and…

Read More

Ransomware Group Threatens DC Cops with Informant Data Leak

Ransomware Group Threatens DC Cops with Informant Data Leak

Washington DC’s police department has reportedly been hit by Russian-speaking ransomware threat actors who claim to have stolen sensitive information on informants. The Babuk group has given the police three days to pay-up before it shares the data with local gangs, according to AP. As is usually the case with “double extortion” ransomware attempts like this, the group has apparently posted screenshots of the stolen data on a dark web-hosted website. These include intelligence reports,…

Read More

Would you know if your organisation had suffered a data breach?

Would you know if your organisation had suffered a data breach?

Too often, organisations fall into the trap of thinking that cyber security is only about preventing data breaches. Their budget is dedicated to anti-malware software, firewalls, staff awareness training and a host of other tools designed to prevent sensitive information falling into the wrong people’s hands. But what happens when those defences fail? It’s a question all organisations must ask themselves, because even the most resilient systems can be compromised. You can’t assume that an…

Read More
1 2,388 2,389 2,390 2,391 2,392 2,659