
Cybersecurity
-

Comments by: Tim Mackey, Principal Security Strategist, at Synopsys Cybersecurity Research Centre (CyRC) Traditionally, cybersecurity incidents have involved direct attacks between malicious actors and their victims. The Threat Landscape for Supply Chain Attacks report highlights an important shift in cybercriminals’ tactics – indirectly targeting the their victims through the software of their trusted third-party suppliers and service…
-

Ivanti, the automation platform that discovers, manages, secures and services IT assets from cloud to edge, has announced the latest release of Ivanti Neurons™ for Zero Trust Access. Ivanti Neurons for Zero Trust Access helps organisations improve their security posture through a Zero Trust aligned and flexible direct-to-application access solution. With this announcement, Ivanti continues to…
-

Comments by: Ashwin Ram, Cyber Security Evangelist, at Check Point Software Technologies Cyber criminals are always looking for new ways to acquire new victims. They will look to exploit platforms, operating systems, applications, infrastructure etc. to execute their scams and malicious activities. Discord is just one of many messaging platforms that is used by cyber…
-

Comments by: Tim Mackey, Principal Security Strategist at Synopsys Cybersecurity Research Center (CyRC) Each year the IBM Cost of a Data Breach report provides a wealth of insights into the business impact of a data breach. This year, what caught my eye was the increase in the length of time it took to identify and…
-

Claroty, the industrial cybersecurity company, has launched Team82, its new research arm that provides indispensable vulnerability and threat research to Claroty customers and defenders of industrial networks worldwide. Additionally, Team82 released a new report on critical vulnerabilities found in cloud-based management platforms for industrial control systems (ICS), highlighting the rise of ICS in the cloud…
-

Comments by: Boris Cipot, Senior Security Engineer, at Synopsys Software Integrity Group Misleading a computer user to install malicious software has always been a significant issue in malware distribution. This is mainly due to people using anti-malware software, especially if it has predictive technology to identify malicious actions on the fly. In the case of…
-

Comments by: Ashutosh Rana, Senior Security Consultant, Synopsys Software Integrity Group Hearing about new malware variants for popular operating systems like Mac or Windows, as well as malware-as-a-service should not be surprising to anyone. This variant (and most other malware) depends on social engineering techniques to infect the host machine. Despite a lot of technical…
-

Sophos, a global leader in next-generation cybersecurity, has announced that it has acquired Braintrace, further enhancing Sophos’ Adaptive Cybersecurity Ecosystem with Braintrace’s proprietary Network Detection and Response (NDR) technology. Braintrace’s NDR provides deep visibility into network traffic patterns, including encrypted traffic, without the need for Man-in-the-Middle (MitM) decryption. Located in Salt Lake City, Utah, Braintrace…
-

With the number and impact of cyber attacks continuing to increase rapidly, BT has today announced a multi-million pound investment in Safe Security, an industry-leading cyber risk management firm. Headquartered in Silicon Valley, their SAFE (‘Security Assessment Framework for Enterprises’) platform allows organisations to take a health check of their existing defences and understand their…
-

By: Andy Ng, Vice President and Managing Director, Asia South and Pacific Region, Veritas Technologies The ransomware attack on global meat processing company, JBS, has given us yet another glimpse into the pernicious world of ransomware where cybercriminals eye an easy payday by going after big organisations in the supply chain. According to reports, the…

You must be logged in to post a comment.