Blog Blog https://www.akamai.com/blog CySecBot CySecBot
#ISC2Congress: Which Pen-Testing Approach is Right for Your Business?
How to determine the best pen-testing strategy for your organization
#DxPsummit: Use Quarantine in Your Ransomware Recovery
How an air-gapped strategy and quarantine can ensure ransomware recovery
#ISC2Congress: Building a Resilient Cybersecurity Industry from #COVID19
Lessons can be taken from the COVID-19 pandemic, according to Juliette Kayyem
Increase in Ransomware Sophistication and Leverage of Legacy Malware Predicted for 2021
Sophos’ 2021 threat report predicts an increase in ransomware and legacy malware use
Americold Operations Downed by Cyber-Attack
Drivers stuck outside facilities after suspected ransomware attack
Chinese APT FunnyDream Runs Riot in Southeast Asia
Bitdefender says 200+ machines already compromised
Trump Fires CISA Boss Who Said Election Was “Most Secure in History”
Christopher Krebs was a well-respected industry figure
Three-Quarters of IT/Security Execs Concerned Over Security of Remote Workforce
There has been a 34% rise in vulnerabilities in 2020
Kali Linux 2020.4 Release (ZSH, Bash, CME, MOTD, AWS, Docs, Win-KeX & Vagrant)
We find ourselves in the 4th quarter of 2020, and we are ecstatic to announce the release of Kali Linux 2020.4, which is ready for immediate download or updating.
What’s different with this release since 2020.3 in August 2020 is:
ZSH is the new …