As new cyberattack trends continue to emerge, burnout among cybersecurity teams remains a critical issue, according to VMware’s new Global Incident Response Threat Report. The Palo Alto, Calif.-based company’s report, issued during Black Hat USA 2022, details how the “ceaseless wave of cyberattacks,” pandemic disruptions and a constantly shifting threat landscape is causing nearly 47% […]
Latest Content
Vulnerability Discovered in Dahua’s ONVIF Implementation
The vulnerability could be abused by attackers to access Dahua cameras with full privileges, including watching live video footage.
Cybersecurity firm Nozomi Networks recently revealed it had discovered a new vulnerability affecting the implementation of an Open Network Video Interface Forum (ONVIF) authentication mechanism in some IP cameras developed by Dahua Technology. According to a blog post by the cyber experts, this vulnerability could be abused by attackers to compromise Dahua network cameras by sniffing a […]
These are the Top 11 Malware Strains Observed in 2021
These are the top malware strains that IT and security professionals should protect against, according to U.S., Australian cybersecurity officials.
A new joint cybersecurity advisory from the U.S. Cybersecurity and Infrastructure Security Agency (CISA) and the Australian Cyber Security Centre (ACSC) details the 11 most-observed malware strains from the last year, including remote access Trojans, banking Trojans, information stealers and ransomware. In the advisory, CISA along with the ACSC says most of these top malware […]
Netskope Launches Borderless WAN Offering With New Acquisition
Company says Netskope Borderless WAN will enable customers to apply uniform security and quality of experience policies to hybrid work needs.
Cloud security and SASE firm Netskope says it is launching a new Borderless WAN offering after acquiring Infiot, which it calls a pioneer in secure, reliable access with zero trust security, network and application optimization and AI-driven operations. The Santa Clara, Calif.-based Netskope says the addition of Infiot’s technology as Netskope Borderless WAN will enable […]
This Week in IT: Teams and Apple Silicon, Cloud Leaders, VMware and Cisco Patches
Better Teams performance on Macs, cloud infrastructure market data, critical patches and cyber threats highlight this week's IT news.
Editor’s note: There is a lot going on in the world of IT, from emerging technologies to digital transformation and new cybersecurity threats. However, we can’t possibly cover it all, so we’ll bring you this curated summary of IT and enterprise technology stories each week. Microsoft Teams on Macs with Apple silicon Microsoft will be rolling out […]
Router Security Flaws Surge to Record Heights
Router security flaws may expose individuals and corporate networks to cybersecurity dangers. Here's how to secure your home WiFI network.
With the rise of remote work, routers are gaining more attention. Remote work opens the possibility for hackers to breach corporate security by abusing old and unpatched home routers, according to Atlas VPN. Router flaws may expose individuals and corporate networks to cybersecurity dangers such as hacking, data breaches, financial fraud, industrial espionage and others. […]
How to Vet a Vendor’s Transparency and Trustworthiness
With the rise of the cloud and SaaS, organizations should demand transparency of their tech vendors. Here's how to vet their trustworthiness.
Has your organization ever found out about a technology vendor’s security incident from news reports rather than a transparent disclosure to customers from the vendor itself? If so, and that vendor has not profusely apologized for not disclosing that incident, then it may be time to cut bait with that particular provider. That is especially […]
How to Win at Cybersecurity: Become a “Sneaker” CISO
Too many security pros today are so deep into the technology that they don’t pay enough attention to the people and processes.
To protect against cybercrime, every organization needs to build a culture of information security. To do that, infosec leaders need to become “sneaker CISOs.” There are three elements to security: Technology, people and processes. Sneaker CISOs are more focused on people and process than on technology. Too many security professionals today are so deep into […]
Microsoft Launches Defender Experts for Hunting
Microsoft Defender Experts for Hunting, a new service featuring Microsoft security experts designed to go beyond the endpoint.
Microsoft is helping organizations add to their security operations center’s threat hunting capabilities with Microsoft Defender Experts for Hunting, a new service featuring Microsoft security experts designed to go beyond the endpoint. According to Microsoft, experts will hunt for suspicious activity across endpoints, Office 365, cloud app and identities, and hand off that contextual alert […]
Atlas VPN: Ransomware Hackers Take 30+ Terabytes of Data in 2022
Ransomware attacks have been terrorizing businesses of all sizes and stealing more than 30 TB of data through more than 300 attacks in 2022.
Ransomware hackers have stolen over 30 terabytes (TB) of personal and other sensitive data throughout more than 300 attacks in 2022, according to researchers at Atlas VPN. The team analyzed 623 ransomware incidents across the EU, the United Kingdom and the United States for a reporting period from May 2021 to June 2022. In January, […]