Barracuda Networks reveals latest spear-phishing trends
Analysis of 5G Network Security Reveals Attack Possibilities
5G security research discloses exploit opportunities
Smart DNS for the New Network: Optimizing Content Delivery
The presence of public “over the top” DNS resolution alternatives is a strong motivator for ISPs to invest in making their DNS resolution infrastructure the best that it can be. Resolvers are the glue that binds subscribers to their fixed and mobile br…
Sextortionists Deploy New Spyware
Goontact targets iOS and Android users in Asia who visit sites selling escort services
Refinitiv Acquires GIACT
Refinitiv boosts cybercrime-fighting abilities with acquisition of Giact Systems
Lithuania Suffers “Most Complex” Cyber-attack in Years
Cyber-attack during government’s transition is the most complex to hit Lithuania in years
Cloudhouse Acquires UpGuard Core to Help Customers Resolve Compliance Issues
Cloudhouse acquires UpGuard Core as it looks to expand its offerings and reach
Society at Increasingly High Risk of Cyber-Attacks
Kevin Curran outlines the ease in which cyber-attacks can be conducted
Twitter, Facebook, Zoom, LinkedIn, Instagram, Microsoft Teams, Gmail, Hotmail are they safe to use?
This was a question that deeply interested me for two primary reasons. The first was that even if they were unsafe, people would continue to use them because not to, meant that societal and business connections would be hampered. Afterall, most o…
Microsoft Set to Block SolarWinds Orion Binaries
Malicious updates were responsible for recent Russian attacks