TLS-Encrypted Malware Volumes Double in Just Months

TLS-Encrypted Malware Volumes Double in Just Months

The volume of malware hidden in encrypted traffic has doubled over the past few months as threat actors look to circumvent security tools, according to Sophos. The security vendor claimed that 23% of the malware it detected in 2020 was encrypted with the Transport Layer Security (TLS) protocol. However, in the first three months of 2021, the figure had grown to reach nearly 46%. The rise can be linked to an overall increase in use…

Read More

The role of transparency in establishing security assurance

The role of transparency in establishing security assurance

The role of transparency in establishing security assurance | 2021-04-23 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More

The threat landscape for the water industry

The threat landscape for the water industry

The threat landscape for the water industry | 2021-04-23 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More

Personalization and behavior modeling: a new approach to security training

Personalization and behavior modeling: a new approach to security training

Personalization and behavior modeling: a new approach to security training | 2021-04-23 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn…

Read More

Product Takeback and Reuse – One Year Later – Cisco Blogs

Product Takeback and Reuse – One Year Later – Cisco Blogs

Reflecting on the nexus of Cisco’s product takeback and reuse program a year and a half after we relaunched it, Cisco VP of Global Distribution Sales Andrew Sage explains, “We wanted to make it as easy for our customers and partners to [send back old equipment] as it is to take recycling to the end of the driveway.” By streamlining and simplifying the customer experience, Cisco has made important progress toward that goal. Let’s take…

Read More

Transform IT for Agility, Innovation, and Growth – Cisco Blogs

Transform IT for Agility, Innovation, and Growth – Cisco Blogs

From the dot-com bust to the global financial crisis, past disruptions have led many businesses to put their digital strategies on the backburner. Organizations that continued to invest in next-generation technologies had an easier time shifting gears to speed ahead. They understood that proactive optimization and continuous transformation are necessary pathways to agility, growth, and innovation. It’s time to transform Fast-forward to 2021. Digital technology is now commonplace in nearly every industry, but organizations are…

Read More

The boom in collaboration software creates extra security risks

The boom in collaboration software creates extra security risks

While the software solutions have made it easier to work from home, they’ve also made it easier to launch malware. TechRepublic’s Karen Roby spoke with Otavio Freire, president, CTO and co-founder of SafeGuard Cyber, about security issues in collaboration software. The following is an edited transcript of their conversation. Karen Roby: We do all of our work now, or the good majority of it, through things like this, right? Zoom and Teams, and we’re talking…

Read More

Addressing the Challenge of Application Performance and the Cloud – Cisco Blogs

Addressing the Challenge of Application Performance and the Cloud – Cisco Blogs

Not to state the overly obvious, but companies have substantially accelerated their migration to the cloud over the last eighteen months. The pandemic forced them to get more done, faster, and often for less. And they found the cloud was the ultimate enabler. The move to the cloud, even with all of its promise, isn’t without challenges. Cloud-based applications may seem easy for individual users to access—just click and go. But, for IT departments, it’s…

Read More

China-linked APT used Pulse Secure VPN zero-day to hack US defense contractors

China-linked APT used Pulse Secure VPN zero-day to hack US defense contractors

At least one China-linked APT group exploited a new zero-day flaw in Pulse Secure VPN equipment to break into the networks of US defense contractors. According to coordinated reports published by FireEye and Pulse Secure, two hacking groups have exploited a new zero-day vulnerability in Pulse Secure VPN equipment to break into the networks of US defense contractors and government organizations worldwide. The statement reveals that one of the two hacking groups was a China-linked cyber espionage group….

Read More
1 3,501 3,502 3,503 3,504 3,505 3,909