Trellix Advanced Research Centre’s investigation exposes serious vulnerabilities in CyberPower’s DCIM platform and Dataprobe’s iBoot PDU, highlighting potential unauthorized access …
Opinion: It’s time to say ‘hello’ to external attack surface management
OPINION: Tarek Naja, Solutions Architect, at Qualys, believes that in order to overcome the complexities that come with moving workloads …
Kaspersky experts warn of increased IT supply chain attacks by OilRig APT in the Middle East & Turkiye
Kaspersky researchers announced the discovery of a series of attacks by a new malware supposedly developed by the infamous OilRig …
APT groups muddying the waters for MSPs
A quick dive into the murky world of cyberespionage and other growing threats facing managed service providers – and their customers.
Sophos Announces Sophos X-Ops
Sophos Announces Sophos X-Ops.
ESET’s detection and response capabilities tested in MITRE Engenuity ATT&CK Evaluations
ESET’s detection and response capabilities tested in MITRE Engenuity ATT&CK Evaluations.
Attempts to exploit MS Exchange and password guessing were the most frequent intrusion vectors
ESET Threat Report: Attempts to exploit MS Exchange and massive waves of password guessing were the most frequent intrusion vectors.
Tenable Research Reveals Over 40 Billion Records Were Exposed in 2021
Tenable Research Reveals Over 40 Billion Records Were Exposed in 2021 almost a 78% increase on 2020.
UAE: Industrial control systems spyware and malicious scripts on the rise in H1 2021
UAE: Industrial control systems spyware and malicious scripts on the rise in H1 2021.
Op-Ed: Legal expert examines the complexities of US-China tech war
Tim Taylor QC, Managing Partner at King & Wood Mallesons Dubai, has penned a forensically in-depth op-ed on the rivalry …
Cobalt Strike: Favourite Tool from APT to Crimeware
Cobalt Strike: Favorite Tool from Advanced Persistent Threat (APT) to Crimeware.
Hacking victims are uncovering attacks faster: FireEye
The global median dwell time, defined as the duration between the start of a cyber intrusion and it being identified, …
US charges Chinese hackers over Equifax data breach
The United States has reportedly charged four Chinese military hackers for the 2017 Equifax data breach.
Knowledge is power: ThreatQuotient’s Jonathan Couch on the strategic value of threat intelligence
ThreatQuotient senior vice president of strategy Jonathan Couch discusses how enterprises can pull strategic value from threat intelligence.
How to address the challenges of insider risks
While external cyber risks are devastating there is a growing number of organisations are concerned about security risks resulting from insiders.
Abuse of personal information, sophisticated attacks to rise in 2020: Kaspersky
Kaspersky researchers have shared their vision on Advanced Persistent Threats (APTs) in 2020, pointing out how the landscape of targeted attacks will change in the coming months.
“The restrictions have a greater impact on the US than on Huawei”: Andy Purdy
In an exclusive interview with TahawulTech.com, Huawei USA chief security officer Andy Purdy discusses the US government’s treatment of the Chinese ICT company.
Kaspersky spotlights blockchain’s role in accelerating security
Amir Kanaan, managing director, META, Kaspersky, discusses the firm’s latest blockchain-based innovations.
Who has ‘Trump’ card in tech trade war between US and China
The ongoing trade war between the United States and China shows no signs of reaching a resolution as negotiations between the two global economic superpowers remains deadlocked. However, the topic of technology has now temporarily displaced the thorny subject of tariffs as the main currency in the dialogue between officials in Beijing and Washington, with the US, launching an aggressive offensive against major technology players in China.
Building trust in the digital era
In a bid to ensure transparency and data integrity, Kaspersky Lab is moving a number of its core processes from Russia to a brand-new Transparency Centre. Based in Zurich, Switzerland, the new facility reflects the company’s determination to assure trustworthiness of its products, services and internal processes.