Tactical strategies for strengthening the security profile

Tactical strategies for strengthening the security profile

Tactical strategies for strengthening the security profile | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

Cybersecurity for Industrial Control Systems: Part 2

Cybersecurity for Industrial Control Systems: Part 2

Legacy malware had the most detections in India, China, the US, and Taiwan. For coinminer, Equated malware, and WannaCry, India had the most detections. On the other hand, Japan had the most Emotet infections, while ICSs in Germany had the most adware incidents. Through this extensive research, we found that there were several malware threats that pose a great risk on ICSs. By identifying these threats, we can now determine various steps that your enterprise…

Read More

Defending Users’ NAS Devices From Evolving Threats

Defending Users’ NAS Devices From Evolving Threats

Defending Users’ NAS Devices From Evolving Threats In our latest research, we analyze the threats targeting well-known brands of network-attached storage (NAS) devices. By: Stephen Hilt, Fernando Merces January 20, 2022 Read time:  ( words) Threats to the internet of things (IoT) continue to evolve as users and businesses grow increasingly reliant on these tools for constant connectivity, access to information and data, and workflow continuity. Cybercriminals have taken notice of this dependence and now…

Read More

3 growing trends in cybersecurity

3 growing trends in cybersecurity

3 growing trends in cybersecurity | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy closing…

Read More

Active archiving boosts cybersecurity protection

Active archiving boosts cybersecurity protection

Active archiving boosts cybersecurity protection | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy closing…

Read More

New Ransomware Spotted: White Rabbit and Its Evasion Tactics

New Ransomware Spotted: White Rabbit and Its Evasion Tactics

New Ransomware Spotted: White Rabbit and Its Evasion Tactics Ransomware We analyze the ransomware White Rabbit and bring into focus the familiar evasion tactics employed by this newcomer. By: Arianne Dela Cruz, Bren Matthew Ebriega, Don Ovid Ladores, Mary Yambao January 18, 2022 Read time:  ( words) We spotted the new ransomware family White Rabbit discretely making a name for itself by executing an attack on a local US bank in December 2021. This newcomer takes a page from Egregor, a more established ransomware family, in hiding its malicious activity and carries a potential connection to the advanced persistent…

Read More

Cybersecurity for Industrial Control Systems: Part 1

Cybersecurity for Industrial Control Systems: Part 2

Cybersecurity for Industrial Control Systems: Part 1 Ransomware In this two-part series, we look into various cybersecurity threats that affected industrial control systems endpoints. We also discuss several insights and recommendations to mitigate such threats. By: Trend Micro Research January 15, 2022 Read time:  ( words) The ever-changing technological landscape has made it possible for the business process on the IT side of an enterprise to be interconnected with the physical process on the OT…

Read More

Top 28 cybersecurity conferences of 2022

Top 28 cybersecurity conferences of 2022

Top 28 cybersecurity conferences of 2022 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy…

Read More

Top 29 cybersecurity conferences of 2022

Top 29 cybersecurity conferences of 2022

Top 29 cybersecurity conferences of 2022 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy…

Read More

This Week in Security News – January 14, 2022

This Week in Security News – January 14, 2022

Read on: Defending Systems Against Attacks with Layers of Remote Control As organizations brace themselves for the year ahead, now is an opportune time to take stock of how they can strengthen their security posture and shore up their defenses. While organizations may have the power of leading-edge cybersecurity solutions on their side, malicious actors continue to work diligently to refine their methods and take advantage of vulnerabilities every chance they get. Congress To Update…

Read More
1 27 28 29 30 31 42