News

Synopsys Code Sight

RiskIQ, released its Vulnerability Landscape report, a high-level view of critical vulnerabilities in twelve very widely used remote access and perimeter devices. The report shows that the rapidly increasing adoption of these devices throughout the COVID-19 pandemic is increasing digital attack surfaces outside the corporate firewall at incredible speed—and introducing a range of critical, rapidly proliferating vulnerabilities. Cybercriminals and nation-states are already taking advantage of these security flaws, including those in F5 Networks' BIG-IP product...

Read more
Lookout! Total App Defence is Here

It is common practice for businesses to implement some kind of central tool to manage smartphones and tablets. Normally, this is done through solutions referred to as mobile device management (MDM), which can ensure mobile devices are configured properly for business use. MDMs can also be used to mandate certain built-in device security settings, such as device lock-screen and pin code length. It would be a mistake, however, to assume that this provides adequate enterprise-grade...

Read more
emotet malware

The past few days has seen the resurgence of Emotet, a dangerous email threat vector that aims to steal sensitive and financial information. ZIX, the cybersecurity company that specialises in email security has uncovered a worrying trend that could lead to users falling victim to cybercriminals seeking to exploit the uncertainty of these precarious times by stealing money from unwitting and undersecured users. This instance of financial-stealing malware is appearing again after five months under...

Read more
AppSec

Patrick Carey, Director of Product Marketing at Synopsys In the 2020 Verizon Data Breach Investigations Report (DBIR), it was found that 43% of data breaches are linked to application vulnerabilities; a number that has more than doubled in comparison to the year prior. Considering recent events, including the COVID-19 outbreak and the Black Lives Matter movement, this situation will likely deteriorate as cybercriminals are quick to take advantage of heightened emotions to further their own...

Read more

IT Security Guru interviewed Nick Bell, detective superintendent and national policing director for Cyber Resilience Centres with the NPCC National Cybercrime Programme. Q1: This is the first role of its kind within policing  - why was it important to establish the role? Ans: “Policing needs to reach out across partnerships and the Cyber Resilience Centre (CRC) network brings together so much knowledge and experience across business, academia and the police to combat cybercrime and protect...

Read more
Tony Morbin IT Security Guru Editor

Today Tony Morbin joined IT Security Guru as editor in chief, signalling a drive to further develop this vital news and information source for the cyber security industry. Last week Tony left SC Media UK, the world’s longest established cyber security title, where he oversaw the transition from print to digital, as well as more recently engaging in the move from live to digital events during the coronavirus pandemic. Tony has also been publisher at Ten...

Read more
Major spike in cyber threats during Covid-19 pandemic – insights from the Telco Security Alliance

The COVID-19 Threat Intelligence Insight report was provided by AT&T Cybersecurity and the Telco Security Alliance (TSA), which observed cyberthreat activity between January and June 2020. The TSA consists of a group including Singtel (Trustwave), and Telefónica (ElevenPaths), and aims to offer enterprises comprehensive cybersecurity insights to help them address the threat of cyberattacks and the evolving threat landscape.   The findings include threat intelligence examined and provided by AT&T Alien Labs Open Threat Exchange,...

Read more
One Identity Logo

One Identity, provider of identity-centered security, today announced the company’s 2nd second consecutive year being named an Overall Leader for its Privileged Access Management solutions in KuppingerCole’s 2020 Leadership Compass for Privileged Access Management (PAM) report. 1 This recognition follows One Identity’s recent placement as an Overall Leader in KuppingerCole’s Leadership Compass for Identity Governance and Administration (IGA) report. 2   When creating the 2020 Leadership Compass PAM report, KuppingerCole Analysts evaluated the strengths and...

Read more
Corelight logo

Recently, security research group JSOF released 19 vulnerabilities related to the “Treck” TCP/IP stack. This stack exists on many devices as part of the supply chain of many well known IoT/ICS/device vendors. Think 100s of millions/billions of devices and you are in the right ballpark. The set of vulnerabilities is collectively known as “Ripple20” , and yes – like all big exploits it has its own website https://www.jsof-tech.com/ripple20/  (a fascinating read) and of course a logo. Refer also...

Read more
Calling all Cybersecurity Heroes for Unsung Heroes Awards!

Eskenzi PR has today announced that the fifth annual Security Serious Unsung Heroes Awards are open for nominations. The 2020 awards are a chance to celebrate the people, not products, on the front lines of battling cyber threats – whether that be in the classroom, in law enforcement or within corporate organisations. A new category has been added this year for those helping to keep UK businesses safe through the COVID-19 pandemic.     Nominations are open until the 31st of August 2020 and the Unsung Heroes Awards will take place...

Read more
Page 1 of 1043 1 2 1,043