Eskenzi PR ad banner Eskenzi PR ad banner

News

onelogin Virgin

OneLogin, the leader in Unified Access Management which delivers simple and secure application access and identity management to enterprises, today announced that Virgin Hyperloop One chose OneLogin's cloud-based platform to improve security for all intellectual property across its enterprise applications. "We came to OneLogin to replace our outdated legacy product and needed a solution that could deploy our mission-critical applications in less than 24 hours, while also providing the utmost level of security and ease-of-use,"...

Read more
Fingerprint Biometrics Computer

The misuse of legitimate security tools by criminals and state-sponsored actors has been a dilemma for close to two decades. Penetration-testing software and red-teaming frameworks were built for the purpose of testing the defences of enterprise networks, but that hasn’t stopped individuals and collectives with malicious intent from pirating or hacking these tools and using them to nefarious ends. Cobalt Strike is one such tool that is being widely abused, and if your organisation has...

Read more
it security guru

Parents of children who watch gaming streams on Twitch or YouTube on their phones or computers may be at risk of fraud thanks to a six-month long hacking rampage that targeted gamers. Attackers offering cheats for popular games Fortnite, Apex Legend and Counter-Strike fooled victims into downloading “hit-and-run” malicious software that extracted valuable personal information like Netflix, Linkedin and airmile account passwords along with auto-complete form data like names, addresses and credit card details. Source:...

Read more
it security guru

An unnamed person is reportedly demanding 300 bitcoin (worth around $3.5 million) from Malta-based exchange Binance, implying that it will continue to release 10,000 photos that relate to alleged stolen know-your-customer (KYC) data in January if it fails to comply. In a statement today, Binance said it’s investigating the case for “legitimacy and relevancy,” but noted that there are “inconsistencies” with the published data, compared to the information in their system. Source: Yahoo! Finance

Read more
it security guru

Kaspersky, a cybersecurity firm, says the number of mobile financial attacks it detected in the first half of the year rose by 107 per cent. The firm said it observed that attackers perpetuated their acts using pseudo names of prominent financial services and banks in its latest financial threat report. Analysts at the company said they discovered 3.7 million mobile financial attacks from January to June this year and found 438,709 unique users attacked by...

Read more
it security guru

Check Point Software Technologies issued a report yesterday that detailed how its security researchers were able to remotely install malware on a digital DSLR camera. In it, researcher Eyal Itkin found that a hacker can easily plant malware on a digital camera. He says that the standardised Picture Transfer Protocol is an ideal method for delivering malware: it’s unauthenticated and can be used with both Wi-Fi and USB. The report notes that individual with an...

Read more
it security guru

I plugged the Apple lightning cable into my iPod and connected it to my Mac, just as I normally would. My iPod started charging, iTunes detected the device, and my iPod produced the pop-up asking if I wanted to trust this computer. All expected behaviour. But this cable was hiding a secret. A short while later, a hacker remotely opened a terminal on my Mac's screen, letting them run commands on my computer as they...

Read more
Tenable Expands Partner Ecosystem To Span The Cyber Exposure Lifecycle.

Tenable®, Inc., the Cyber Exposure company, today announced the expansion of its Cyber Exposure ecosystem with new and enhanced technology integrations from leading vendors in public cloud infrastructure, SIEM and IT Service Management solutions. This news follows Tenable’s announcement of new innovations to automatically discover and assess rogue assets across on-premises and cloud environments. Together, they enable customers to manage, measure and reduce cyber risk holistically through greater visibility across the modern attack surface plus...

Read more
CyberArk

As the industry leader, only CyberArk has the technology expertise and experience to deliver innovative solutions that make it simple and easy for cloud-first organisations and those embracing digital transformation to consume, use and manage privileged access security solutions, especially in hybrid cloud environments. “Privileged access security is foundational to effective cybersecurity programmes. As our customers increasingly operate in SaaS and cloud-first environments, it’s critical for CyberArk to build upon our deep knowledge and understanding...

Read more
AJ Thompson, CCO of Northdoor plc

Organisations are increasingly aware that they should take their own cyber security and compliance requirements seriously. However, what security measures are in place for their third parties? Securing Internal Systems Now that the General Data Protection Regulation (GDPR) has come into force, organisations have become conscious of the significant legal requirements imposed by GDPR and the business risks posed by cyber security breaches. Many have begun to devote substantial resources to identifying and eliminating internal...

Read more
Page 249 of 364 1 248 249 250 364