ESET has recently launched its latest consumer security product portfolio for Windows. The new range is designed to protect against …
RSA Conference 2017 boosts regional cybersecurity agenda
RSA Conference, in conjunction with the Telecommunications Regulatory Authority (TRA), has successfully concluded this year’s Conference with over 1100 attendees from around the world.0 3018US government officially attributes WannaCry cyber-attack to North Korea
“After careful investigations, the United states is publicly attributing the massive WannaCry cyber-attack to North Korea,” said White House homeland security adviser Tom Bossert.
US official says North Korea is ‘directly responsible’ for WannaCry attacks
“The attack was widespread and cost billions, and North Korea is directly responsible,” wrote Homeland Security adviser to President Donald Trump Tom Bossert.
The cyber kill chain: Understanding the stages of a targeted cyber-attack
Lockheed Martin’s cyber kill chain approach breaks down each stage of a malware attack where you can identify and stop it.
Trend Micro: 2018 cyber-attacks will rely on vulnerabilities
Trend Micro, a global player in cybersecurity solutions, predicts the trend of known vulnerabilities being used in major attacks will …
Course of action: Key considerations for an effective security awareness programme
Morey Haber, vice president of technology, BeyondTrust, lays out a set of critical factors that Middle East organisations should consider when building security awareness training programmes.
Using IoT devices to launch attacks from within
The number of IP-enabled IoT devices has increased dramatically in the last several years and according to Gartner, it is predicted …
Fortinet: Self-learning “Swarm” cyber-attacks to be expected in 2018
Fortinet has unveiled predictions from the Fortinet FortiGuard Labs global research team about the threat landscape for 2018.
Rise of the machines: How AI tech can help build stronger security defences
As AI tech transform modern IT systems, how can organisations leverage them to build better defences and stay on top of cybersecurity incidents?
Down the rabbit hole: Beware of Bad Rabbit ransomware
The ransomware prompts users to download an Adobe Flash update when visiting an infected website instead of attacking a weakness in the computer’s security.