Terry Young, Director of Service Provider Product Marketing, A10 Networks explores the most pressing attack vector for organisations to be aware of in the coming months.
Tenable expands Generative AI capabilities for faster attack path analysis and mitigation guidance
Enhancements to Tenable One platform enable customers to directly query AI engine and quickly reduce risk.
ESET Research discovers espionage apps on the attack in Pakistan, utilising romance scams
The campaign leveraged Google Play to distribute six malicious apps bundled with VajraSpy RAT code; six more were distributed in the wild.
Veeam launches novel cybersecurity program in bid to curb ransomware attacks
Veeam® Software, has announced the availability of the new Veeam Cyber Secure Program which combines Veeam’s purpose-built technology with a …
Half of organisations have suffered a cyberattack or incident that prevented access to data in 2023
Dell Technologies 2023 Global Data Protection Index reveals increasing complexity of data protection and rising implications of IT downtime and security breaches.
Veeam Data Protection Trends Report 2024 finds cyber-attacks the #1 cause of business outages
Survey reveals 92% of organizations will increase 2024 data protection spend, to achieve cyber resilience amidst continued threats of ransomware and cyber-attacks.
Cloudflare report shows DDoS attacks surged in 2023
Cloudflare has announced its 2023 Q4 DDoS report – which showed that DDoS attacks reached new heights in 2023. This …
The rising threat of lookalike domain attacks! Be aware of these 4 types
Detecting and not falling prey to these kinds of attacks are crucial, but the ability to takedown lookalike domains is equally important. Lookalike domain attacks are increasing in sophistication and prevalence, making specialized solutions like DNS security a must-have for all.
How telecommunications providers can best tackle DDoS attacks
In 2024, the telecommunications industry will continue to focus on technologies such as cloud computing, standalone 5G, AI, and the Internet of Things (IoT) to offer better speed, scalability, and innovation.
Tenable study reveals 40% of cyberattacks breach Saudi Arabian organisations’ defences
Security teams are so busy remediating cyberattacks that they don’t have time or resources to focus efforts on strengthening defences to deflect and protect against them.
Proofpoint executive highlights new developments in conversational attacks on mobile
W. Stuart Jones, Technical Marketing Director in Proofpoint’s Cloudmark Division has highlighted how new conversational attacks on mobile have emerged …
Sophos anticipates AI-based attack techniques and prepares detections
At the Moment, Adversaries are Skeptical of AI for Cybercrime, According to Sophos Research.
Threat predictions for 2024: Attackers have more “easy” buttons than ever
Threat Predictions for 2024: Chained AI and CaaS Operations Give Attackers More “Easy” Buttons Than Ever.
Retail organisations attacked by ransomware increasingly unable to halt an attack in progress
Only 26% of Surveyed Organisations Stopped Cybercriminals from Encrypting Their Data in a Ransomware Attack. This Is the Lowest Rate of Disruption in 3 Years.
Sophos CTO highlights how hackers are using ‘active directory’ to launch attacks
John Shier, Field CTO Threat Intelligence for Sophos, highlights how they deploy tools that allow the early detection of threats as hackers are accelerating their attacks and getting a lot of practice. He emphasizes that it is a constant race and that in order to compete it requires a non-stop monitoring of how fast hackers are moving to active directory, and that users absolutely need a comprehensive protection to stand a chance.
Chief Revenue Officer at BotGuard highlights how their easy and affordable technology quickly helps secure websites against bot attacks
Bertil Brendeke, Chief Revenue Officier at BotGuard, explains the difference between good and bad bot traffic and how their unique web traffic management solution can help websites remain cyber secure.
Resecurity focused on the mindset of hackers in a bid to prevent cyberattacks
Ahmad Halabi, Managing Director at Resecurity (MENA), tells CNME Editor Mark Forker that the company doesn’t focus on technology, but instead examines the mindset and behaviors of hackers to identify a breach before it even happens.
Dwell time—from when an attack starts to when it’s detected—shrinks to 8 days in 2023
It Takes Less Than a Day for Attackers to Reach Active Directory—Companies’ Most Critical Asset. The Vast Majority of Ransomware Attacks Occur Outside of Business Hours.
Vectra AI launches groundbreaking platform for hybrid attack defense
Vectra AI introduces the Vectra AI Platform with Attack Signal Intelligence™, empowering security teams to combat complex hybrid attacks and …
83% of successful cyberattacks in the Middle East had a targeted nature
Attacks on Middle Eastern government agencies are mainly carried out by APT groups (56%), covertly establishing themselves in the victim’s infrastructure for the purpose of cyberespionage.