Eskenzi PR ad banner Eskenzi PR ad banner

Top 10 Stories

Report - More than half of companies making the switch to the cloud risk losing data. Although more businesses are moving to the cloud, especially when it comes to running virtual machines, Druva has warned that more than half of those using the cloud are at risk of losing their data because of poorly implemented data management policies. View Full Story ORIGINAL SOURCE: Cloud Pro

Read more

Lazarus Group, the North Korean hackers who hacked Sony Films a few years back, have deployed their first Mac malware ever, according to Russian antivirus vendor Kaspersky Lab. In a report shared with Bleeping Computer in advance, Kaspersky researchers reveal that Lazarus Group penetrated the IT systems of an Asia-based cryptocurrency exchange platform. View Full Story ORIGINAL SOURCE: Bleeping Computer

Read more

The modernization of utility infrastructures is enabling increased efficiencies and reliability through digitization, connectivity, and IT-based approaches. Smart cyber assets are transforming both power and water grids, allowing operators to deploy and leverage a new generation of functionality and customer services. However, smart utilities are also highly vulnerable to cyberthreats, and security is, therefore, a primary concern, stated ABI Research. View Full Story ORIGINAL SOURCE: Help Net Security

Read more

Attackers are abusing the characteristics of cloud services to launch and hide their activity as they traverse target networks. A new body of evidence indicates threat actors are using increasingly advanced techniques to target cloud providers and leveraging cloud-specific traits to hide their activity as they breach and persist in target networks. View Full Story ORIGINAL SOURCE: Dark Reading

Read more

Tavis Ormandy, a Google Project Zero security researcher, has revealed details about a new major vulnerability discovered in Ghostscript, an interpreter for Adobe's PostScript and PDF page description languages. Ghostscript is by far the most widely used solution of its kind. The Ghostscript interpreter is embedded in hundreds of software suites and coding libraries that allow desktop software and web servers to handle PostScript and PDF-based documents. View Full Story ORIGINAL SOURCE: Bleeping Computer

Read more

Academic Centres of Excellence in Cyber Security Research recognised by the National Cyber Security Centre & Engineering and Physical Sciences Research Council. Three UK universities have been recognised as Academic Centres of Excellence in Cyber Security Research (ACE-CSR), highlighting the country is leading the way in cyber security skills. View Full Story ORIGINAL SOURCE: Gov.co.uk

Read more

Attackers can abuse URL requests processed by an email program for Mac to steal files from the victim — sometimes without user interaction. Severe vulnerabilities in the Airmail 3 software – an alternative to Apple Mail for MacOS – would allow a remote attacker to steal a user’s past emails and file attachments, in many cases without requiring user interaction beyond simply opening a weaponized message. View Full Story  ORIGINAL SOURCE: Theatpost

Read more
Page 12 of 630 1 11 12 13 630