Australia Suffers Widespread Internet Outage

Australia Suffers Widespread Internet Outage

Australians’ lives were disrupted on Thursday by a widespread internet outage that impacted the country’s mail service and multiple businesses, including banks and airlines. The outage began in the early hours and was caused by a problem at Akamai Technologies, a global content delivery network (CDN) and cybersecurity and cloud service provider.  Akamai, which is based in Cambridge, Massachusetts, has acknowledged the issue, but has not yet disclosed the cause of service disruptions to its hosting platform,…

Read More

New possibilities for innovating at the IoT Edge

New possibilities for innovating at the IoT Edge

This blog was co-written by Mirko Grabel, Technical Marketing Leader, and Flo Pachinger, Developer Advocate Get ready for an all-new Cisco industrial router: the Cisco Catalyst IR1800 Rugged Series. With many new interfaces and modules backed by a stronger CPU and more memory, the IR1800 series gives IoT application developers new possibilities for innovating at the IoT Edge, for example to host applications that can extract and transform IoT data right at the edge. The…

Read More

Testing to Ensure Your Security Posture Never Slouches | McAfee Blogs

Testing to Ensure Your Security Posture Never Slouches | McAfee Blogs

How well can you predict, prevent and respond to ever-changing cyberthreats? How do you know that your security efforts measure up? The stakes are high if this is difficult to answer and track.  Imagine if you had one place where you found a comprehensive real time security posture that tells you exactly where the looming current cyber risks are and the impact?  Let’s consider a recent and relevant cyber threat. Take, for example, the May…

Read More

Building the Bridge to Possible, Block by Block – Cisco Blogs

Building the Bridge to Possible, Block by Block – Cisco Blogs

If there are 915,103,765 different ways to set up just six Lego® blocks, imagine the number of options you have when you set up an IT datacenter. Dependencies notwithstanding, the choices are endless. Needless to say, to create a perfectly synchronized hybrid-cloud environment, you need all the help you can get. (Click on the Legos) https://www.mentalfloss.com/article/92127/how-many-combinations-are-possible-using-6-lego-bricks   I have five children — four boys and one girl. They get bored with most toys quickly and…

Read More

Commemorating Juneteenth: Together We Prevail – Cisco Blogs

Commemorating Juneteenth: Together We Prevail – Cisco Blogs

Standing next to my son, we scanned the list of names on a memorial plaque. The sun overhead was intense, but our curiosity and determination were unwavering. I was suddenly overcome with emotion. List of Black Americans lynched after the U.S. Civil War We had found it: “Lafayette County, Mississippi,” read the plaque’s title. That was my husband’s home county. The list of names that followed commemorated one of the worst horrors of American history:…

Read More

Why XDR is Not Enough

Why XDR is Not Enough

By Guy Rosefelt, Security CMO, Sangfor Technologies What is XDR? One of the latest trends in cybersecurity is Extended Detection and Response, more commonly known as XDR.  Although originally defined by Palo Alto Networks as a key capability, other security vendors have released some type of XDR functionality and of course all define and approach it differently.  Gartner defines XDR as “…a unified security incident detection and response platform that automatically collects and correlates data…

Read More

CLOP ransomware suspects charged by police in Ukraine

CLOP ransomware suspects charged by police in Ukraine

Six people alleged to be part of the notorious CLOP ransomware gang have been detained and charged by Ukrainian police, following nearly two dozen raids across the country. According to a statement released by the Ukraine’s cyber police, the hacking group is thought to have inflicted $500 million worth of damage on universities and organisations it exfiltrated data from and infected with ransomware. The arrests are said to be connected to ransomware attacks that took…

Read More

Hackers Can Spy on Peloton Workouts

Hackers Can Spy on Peloton Workouts

Peloton bike users could be spied on while working out, according to new research by McAfee’s Advanced Threat Research team. The team discovered a vulnerability (CVE-2021-3387) in the touchscreen of the $2,495 Bike+ that allows it to be controlled remotely by a threat actor without any interference to the equipment’s operating system. Hackers could exploit the flaw to install malicious apps that spoof Netflix or Spotify to steal personal details and login credentials.  Researchers also found that the…

Read More

LORCA Announces New Intensive Program for Most Promising Cyber Startups

LORCA Announces New Intensive Program for Most Promising Cyber Startups

The London Office for Rapid Cybersecurity Advancement (LORCA) has launched a new initiative designed to propel the growth of UK cyber startups. LORCA Ignite will see six of the most successful companies that have graduated from the LORCA accelerator program during the past three years participate in a new, intensive program, which will help them achieve rapid scale and commercial growth. LORCA is a government-backed initiative that started in 2018 to accelerate the growth of UK cyber startups….

Read More

REvil ransomware gang hit US nuclear weapons contractor Sol Oriens

REvil ransomware gang hit US nuclear weapons contractor Sol Oriens

The REvil ransomware gang made the headlines again, the group hit the US nuclear weapons contractor Sol Oriens and stole the victim’s data. US nuclear weapons contractor Sol Oriens was hit by a cyberattack carried out by the REvil ransomware operators, which claims to have stolen data. Sol Orien provides consultant services to the National Nuclear Security Administration (NNSA), it confirmed to have suffered a cyber attack via Twitter. Sol Oriens statement to us now: “In May…

Read More
1 3,531 3,532 3,533 3,534 3,535 4,074