
Cybersecurity
-

Contributor: Malwarebytes Labs In macOS Mojave, Apple introduced the concept of notarization, a process that developers can go through to ensure that their software is malware-free (and must go through for their software to run on macOS Catalina). This is meant to be another layer in Apple’s protection against malware. Unfortunately, it’s starting to look like notarization…
-

Kaspersky has launched a dedicated collaboration program to help institutions become better equipped at understanding the latest and most prevalent industrial cybersecurity threats. By joining the program, educational institutions, laboratories, research departments, security operations centers (SOC) and emergency response teams (CERT and CSIRT) that meet the partner profile criteria will be able to improve how they conduct their research and…
-

SINGAPORE, AUGUST 26, 2020 – Trend Micro Incorporated (TYO: 4704; TSE: 4704), a global leader in cloud security, today announced its Trend Micro Cloud One™ – Conformity offering is now available to Azure customers, helping global organizations tackle misconfigurations, compliance challenges and cyber-risks in the cloud. The company also achieved the CIS Microsoft Azure Foundation Security Benchmark. This certifies the Conformity product…
-

By: Taylor Armerding, Software Security Expert at Synopsys Software Integrity Group If DevSecOps isn’t working very well in your organisation, you can probably sum up the issue in the same way as “Cool Hand Luke”: “What we have here is a failure to communicate.” Which should not be a shock. While DevSecOps has been around…
-

Phishing is on the rise with more than 1.6 million attempts to transfer users to phishing pages via links within emails blocked from January to June, showing small and medium businesses need cybersecurity improvements in the context of continued remote working The second quarter of 2020 often saw phishers relaxing given that the months of…
-

Kaspersky researchers have published a detailed overview of DeathStalker, a ‘mercenary’ advanced persistent threat (APT) group that has been leveraging efficient espionage attacks on small and medium-sized firms in the financial sector since at least 2012. The most recent discoveries demonstrate that the group has been targeting companies all over the world, from Europe to…
-

Singapore – August 27, 2020: Cyber security provider F-Secure published a report linking an attack against an organization working in the cryptocurrency vertical to Lazarus Group – a highly-skilled, financially-motivated threat actor whose interests reportedly align with the Democratic People’s Republic of Korea (DPRK). By connecting evidence obtained from the attack with existing research, the report concludes the…
-

The YubiKey 5Ci is one of the security products of Yubico, a cyber and information security company. YubiKey 5Ci is a security key that you can use as a two-factor authentication (2FA) for your online accounts like Google, Microsoft, etc. What is 2FA? Two-factor authentication (2FA) is an additional layer of security to verify your…
-

BT Security has announced the key partners that it will work with going forward to provide industry-leading managed security services to customers. The decision follows BT’s largest-ever appraisal of its security suppliers, and a comprehensive review of the security vendor ecosystem as a whole. The decision to refine our security partner base was driven by…
-

Seoul, Korea, August 20, 2020 – SK Telecom announced that it, together with DGB Daegu Bank, will apply its 5G quantum cryptography technology to IM Bank, the mobile banking app of DGB Daegu Bank, in September 2020. Marking the first quantum-powered service in the banking industry, IM Bank will enable users of Samsung Galaxy A Quantum,…

You must be logged in to post a comment.