Date | Title | Description | Source |
24.04.2024 | D.C. startup founded by ex-Defense Department hacker raises ... | - | bizjournal... |
16.04.2024 | Дорога кибербезопасность к 2025 году... | - | kommersant... |
31.03.2024 | Exploring the Depths: The Core Components of IT Security | Share
Tweet
Share
Share
Email
In today’s digital age, where technology permeates every aspect of our... | techbullio... |
31.03.2024 | Unlocking the Mystery: Delving Into IT Security’s Inner Work... | Share
Tweet
Share
Share
Email
In the ever-evolving landscape of technology, the importance of IT sec... | techbullio... |
20.03.2024 | Proofpoint: APAC Employees Are Choosing Convenience, Speed O... | CISOs know best practice information security management comes down to people as much as technology.... | techrepubl... |
04.03.2024 | Zero Trust Security Market registering at a CAGR of 18.5% an... | WILMINGTON, DE, UNITED STATES, March 4, 2024 /EINPresswire.com/ -- The zero trust security industry ... | einpresswi... |
29.05.2023 | The Top 10 endpoint security challenges and how to overcome ... | Join top executives in San Francisco on July 11-12, to hear how leaders are integrating and optimizi... | venturebea... |
30.08.2022 | How new CISOs should take on today’s growing threatscape | Were you unable to attend Transform 2022? Check out all of the summit sessions in our on-demand libr... | venturebea... |
22.08.2022 | Why getting endpoint security right is crucial | Were you unable to attend Transform 2022? Check out all of the summit sessions in our on-demand libr... | venturebea... |
23.05.2022 | Recovering from ransomware attacks starts with better endpoi... | We are excited to bring Transform 2022 back in-person July 19 and virtually July 20 - 28. Join AI an... | venturebea... |
05.05.2022 | CrowdStrike vs FireEye: Compare EDR software | Image: momius/Adobe Stock
Business organizations worldwide battle with incidents of security breache... | techrepubl... |
29.04.2022 | Five Affordable Cyber Security Best Practices For Small Busi... | Participants hold their laptops in front of an illuminated wall at the annual Chaos Computer Club ..... | forbes.com... |
29.04.2022 | Top advanced threat protection tools and solutions 2022 | Image: iStock/weerapatkiatdumrong
What is advanced threat protection?
What does advanced threat prot... | techrepubl... |
25.03.2022 | US charges four Russian spies for hacking Saudi oil facility... | The U.S. Department of Justice has announced charges against four Russian government employees for a... | techcrunch... |
07.03.2022 | What to Make of Microsoft’s Year in Cybersecurity | On Feb. 1, Microsoft announced a new cybersecurity offering for federal government customers called ... | lawfareblo... |
03.03.2022 | CardinalOps raises $17.5M for AI threat detection solution | Join today's leading executives online at the Data Summit on March 9th. Register here.
Today, AI thr... | venturebea... |
03.03.2022 | CardinalOps raises $17.5M for AI threat detection solution | We are excited to bring Transform 2022 back in-person July 19 and virtually July 20 - 28. Join AI an... | venturebea... |
28.02.2022 | A Russia-linked hacking group broke into Facebook accounts a... | Meta said it detected and took down two disinformation campaigns run by people in Russia and Ukraine... | businessin... |
16.02.2022 | Синтетические медиа: сможет ли нейросеть помочь в создании к... | Синтетические медиа: сможет ли нейросеть помочь в создании контента?... | startupjed... |
24.01.2022 | McAfee Enterprise, FireEye merge to become Trellix | Trellix CRO, Adam Philpott.
Symphony Technology Group (STG) has announced the launch of Trellix, a n... | itweb.co.z... |
19.01.2022 | Symphony Technology Group Announces the Launch of Extended D... | Symphony Technology Group (STG) announced today the launch of Trellix, a new business delivering ext... | stgpartner... |
14.12.2021 | Ninety-seven percent of SA IT professionals say their enviro... | Cyber security professional.
News highlights:
Just 3% of South African companies place enough emphas... | itweb.co.z... |
24.11.2021 | Why Do Governments Reveal Cyber Intrusions? | On Sept. 26, Germany held federal elections to select the new members of the Bundestag, the country’... | lawfareblo... |
12.11.2021 | China’s next generation of hackers won’t be criminals. That’... | Dakota Cary Contributor
Share on Twitter
Dakota Cary is a research analyst at Georgetown’s Center fo... | techcrunch... |
05.11.2021 | Cybersecurity: Track data activity before “unusual” becomes ... | Image: Shutterstock/Funtap
There’s usual data activity, unusual data activity, and then there’s dang... | techrepubl... |
28.10.2021 | A Brief History of Online Influence Operations | The Wall Street Journal’s Facebook Files series resumed last week, revealing that the platform took ... | lawfareblo... |
26.10.2021 | China cyber attacks: the current threat landscape | Oct 26, 2021
Editor's note: This post, originally by Adam Hlavek on Jan. 10, 2021, includes updates ... | marketscre... |
25.10.2021 | IronNet : Russian cyber attack campaigns and actors | Oct 25, 2021
Editor's Note: This post, originally published on December 21, 2020, by Adam Hlavek wit... | marketscre... |
19.10.2021 | Testing Cybersecurity Effectiveness: The Importance Of Proce... | VP and CISO for Mandiant, helping guide the company's product and solutions strategy and host of the... | forbes.com... |
15.10.2021 | Расследование: как мы обнаружили новые следы группировки Cha... | Если помните, недавно мы рассказывали о том, как специалисты нашего экспертного центра безопасности ... | habr.com/r... |
05.10.2021 | Qualys : The Rise of Ransomware | With most employees still working from remote locations, ransomware attacks have increased steadily ... | marketscre... |
30.09.2021 | АНБ дало советы по использованию и настройке VPN... | Агентство национальной безопасности и Агентство по кибербезопасности и безопасности инфраструктуры С... | habr.com/r... |
30.09.2021 | Лже-Microsoft, McAfee и Google: как мы обнаружили APT-группу... | Источник: unsplash
На киберарене появился новый участник: специалисты PT Expert Security Center обна... | habr.com/r... |
22.09.2021 | Большая подборка полезных ресурсов от экспертов Positive Tec... | Хотите быть в курсе всего интересного, что происходит в практической информационной безопасности? Зн... | habr.com/r... |
20.09.2021 | Nation-state espionage group breaches Alaska Department of H... | Enlarge / If Alaska's native Ursus arctos population could be enlisted for cyber defense patrols, at... | arstechnic... |
20.09.2021 | Nation-state espionage group breaches Alaska Department of H... | Enlarge / If Alaska's native Ursus arctos population could be enlisted for cyber defense patrols, at... | arstechnic... |
17.09.2021 | Splunk : Hunting for Malicious PowerShell using Script Block... | Share:
By Splunk Threat Research Team September 17, 2021
The Splunk Threat Research Team recently ev... | marketscre... |
15.09.2021 | IronNet Cybersecurity : Analysis of the Iranian cyber attack... | Sep 14, 2021
Table of Contents
1. Most recent Iranian cyber attack news and attack campaigns
2. Iran... | marketscre... |
10.09.2021 | IronNet Cybersecurity : Russian cyber attack campaigns and a... | Sep 10, 2021
Editor's Note: This post, originally published on December 21, 2020, by Adam Hlavek wit... | marketscre... |
31.08.2021 | ZeroFox announces partnership with Mandiant to disrupt malic... | Cybersecurity firm ZeroFox Inc. today announced a global strategic partnership with Mandiant, a part... | siliconang... |
24.08.2021 | Trend Micro Incorporated : APT41 Resurfaces as Earth Baku Wi... | We have uncovered a cyberespionage campaign being perpetrated by Earth Baku, an advanced persistent ... | marketscre... |
19.08.2021 | 83 million devices using the Kalay protocol are at risk for ... | Getty Images/iStockphoto
Kalay, a P2P IoT protocol developed by Taiwanese company ThroughTek, has a ... | techrepubl... |
17.08.2021 | Mandiant Appoints Vikram Ramesh As Chief Marketing Officer | Tech industry executive to drive marketing strategy and amplification around the Mandiant brand
Mand... | aithority.... |
17.08.2021 | Искусство кибервойны: как китайские группы TaskMasters и TA4... | Анастасия Тихонова
Руководитель группы исследования сложных угроз Threat Intelligence Group-IB
Дмитр... | habr.com/r... |
16.08.2021 | FireEye : Advances XDR Platform to Arm Security Operations T... | MILPITAS, Calif. - FireEye, Inc. (NASDAQ: FEYE), the intelligence-led security company, today introd... | marketscre... |
11.08.2021 | Going for the Gold: Penetration Testing Tools Exploit Golden... | Going for the Gold: Penetration Testing Tools Exploit Golden SAML A contrived penetration testing sc... | marketscre... |
10.08.2021 | Chinese group carried out widespread cyber espionage campaig... | United States cybersecurity firm FireEye said a Chinese group has waged a widespread espionage campa... | timesofisr... |
05.08.2021 | КиберВойны ближайшего будущего и почему снова актуален тренд... | Июль 2021 года. Пандемия COVID-19 до сих пор продолжается. По всему миру 196 млн зараженных, 4 млн л... | habr.com/r... |
02.08.2021 | Responsible Cyber Offense | News of the SolarWinds hack emerged with reports the incident had triggered an emergency Saturday me... | lawfareblo... |
22.07.2021 | The world's top ransomware gangs have created a cybercrime &... | Several of the largest Russian ransomware cybercriminal gangs have partnered up and are sharing hack... | cbsnews.co... |
21.07.2021 | Home and office routers come under attack by China state hac... | Enlarge
Getty Images reader comments 122 with 83 posters participating
Share this story
Share on Fac... | arstechnic... |
08.07.2021 | Morgan Stanley discloses data breach that resulted from Acce... | Enlarge
Getty Images reader comments 41 with 32 posters participating
Share this story
Share on Face... | arstechnic... |
06.07.2021 | Up to 1,500 businesses infected in one of the worst ransomwa... | Enlarge
Suebsiri Srithanyarat / EyeEm / Getty Images reader comments 210 with 112 posters participat... | arstechnic... |
29.06.2021 | Cobalt Strike: Favorite Tool from APT to Crimeware | Key Findings
Malicious use of Cobalt Strike in threat actor campaigns is increasing.
Threat actor us... | marketscre... |
17.06.2021 | Proofpoint : New TA402 Molerats Malware Targets Governments ... | Key Findings
TA402 leverages political and military themes, including the ongoing conflict in the Ga... | marketscre... |
03.06.2021 | FIREEYE, INC.
FireEye : Announces Sale of FireEye Products ... | - All cash transaction unlocks high-growth Mandiant Solutions business
- Continued partnership after... | marketscre... |
03.06.2021 | Cybersecurity firm FireEye is selling its products business ... | U.S.-based cybersecurity firm FireEye announced Wednesday that it’s selling its products business, i... | techstartu... |
03.06.2021 | Salesforce wants to battle Microsoft. But will it get Slack ... | This is the web version of Term Sheet, a daily newsletter on the biggest deals and dealmakers. Sign ... | fortune.co... |
02.06.2021 | FIREEYE, INC.
FireEye : Announces Sale of FireEye : Product... | FireEye, Inc. (NASDAQ: FEYE) today announced it has entered into a definitive agreement to sell the ... | marketscre... |
02.06.2021 | FIREEYE, INC.
FireEye : Announces Sale of FireEye Products ... | FireEye Announces Sale of FireEye Products Business
to Symphony Technology Group for $1.2 Billion
· ... | marketscre... |
02.06.2021 | FireEye Announces Sale of FireEye Products Business to Symph... | MILPITAS, Calif., June 2, 2021 – FireEye, Inc. (NASDAQ: FEYE) today announced it has entered into a ... | stgpartner... |
01.06.2021 | Accellion's failure to warn RBNZ of exploited bug led to hac... | The Reserve Bank of New Zealand was hacked after Accellion failed to send out a warning that its Fil... | itnews.com... |
28.05.2021 | Pulse Secure VPN Now At Risk! These Four New Malware Tools C... | Griffin Davis , Tech Times 28 May 2021, 08:05 am
Pulse Secure VPN devices are currently being target... | techtimes.... |
25.05.2021 | PTC INC.
IIoT Cybersecurity: Why Building Your Own Platform... | As companies race to digitally transform themselves and remain competitive, integrating Industrial I... | marketscre... |
22.05.2021 | Hear ye, DarkSide! This honorable ransomware court is now in... | Enlarge
Getty Images reader comments 202 with 117 posters participating
Share this story
Share on Fa... | arstechnic... |
19.05.2021 | SolarWinds Malware Attack: CEO Reveals Hackers Were in the S... | Isaiah Richard, Tech Times 19 May 2021, 08:05 pm
SolarWinds CEO Sudhakar Ramakrishna revealed that t... | techtimes.... |
18.05.2021 | Ransomware is booming as a business model: "It's like e... | The recent ransomware attack on Colonial Pipeline that crippled fuel supplies to 50 million American... | cbsnews.co... |
12.05.2021 | It looks like the Russians have embarrassed Colonial Pipelin... | The national average for gas prices in the US has just hit a record — topping $3 per gallon as of mi... | bgr.com/te... |
11.05.2021 | The Colonial Pipeline and SolarWinds attacks were all but in... | Top-level takeaways:
There are no easy solutions to shoring up U.S. national cyber defenses.
Softwar... | technical.... |
08.05.2021 | Apple brass discussed disclosing 128-million iPhone hack, th... | Enlarge
Getty Images reader comments 328 with 114 posters participating
Share this story
Share on Fa... | arstechnic... |
07.05.2021 | Biggest iPhone Hack Ever: ‘Fortnite’ Trial Exposes Emails De... | Teejay Boris, Tech Times 07 May 2021, 10:05 pm
The Epic vs. Apple trial is bringing us down memory l... | techtimes.... |
05.05.2021 | Beware: This dangerous new malware can steal your passwords ... | Phishing attacks have spawned a slew of new malware threats in recent days, according to researchers... | bgr.com/te... |
04.05.2021 | The Cyberlaw Podcast: The Robot Apocalypse and You | Our interview is with Kevin Roose, author of Futureproof: 9 Rules for Humans in the Age of Automatio... | lawfareblo... |
03.05.2021 | SPLUNK INC.
Clop Ransomware Detection: Threat Research Rele... | Share:
By Splunk Threat Research Team May 03, 2021
Clop Ransomware has been active since 2019 and ha... | marketscre... |
30.04.2021 | More US agencies potentially hacked, this time with Pulse Se... | Enlarge
Getty Images reader comments 87 with 64 posters participating
Share this story
Share on Face... | arstechnic... |
28.04.2021 | AKAMAI TECHNOLOGIES, INC.
Akamai Technologies : Observed Ch... | Reflecting on the cybersecurity threat landscape in 2020, we can't overlook the massive changes that... | marketscre... |
26.04.2021 | In the Wake of SolarWinds, the U.S. Must Grapple With the Fu... | To date, there have been no indicators of disruptive or destructive goals from the sweeping Russian ... | lawfareblo... |
22.04.2021 | Splunk : Monitoring Pulse Connect Secure With Splunk (CISA E... | Share:
By Dave Herrald April 21, 2021
Contributors: Mick Baccio, James Brodsky, Tamara Chacon, Shann... | marketscre... |
21.04.2021 | FireEye : Hackers target SonicWall customers through email w... | WASHINGTON, April 20 (Reuters) - Hackers have targeted customers of California-based network service... | marketscre... |
21.04.2021 | FIREEYE, INC.
FireEye : Hackers target SonicWall customers ... | WASHINGTON, April 20 (Reuters) - Hackers have targeted customers of California-based network service... | marketscre... |
21.04.2021 | FIREEYE, INC.
FireEye : Hackers use previously unknown vuln... | WASHINGTON, April 20 (Reuters) - Hackers have targeted customers of California-based network service... | marketscre... |
21.04.2021 | FIREEYE, INC.
FireEye : Mandiant Advantage Expands SaaS Pla... | New SaaS capabilities leveraging Mandiant's frontline intelligence and expertise target the challeng... | marketscre... |
21.04.2021 | Hackers target SonicWall customers through email weak spot | By Raphael Satter
2 Min Read
FILE PHOTO: A man holds a laptop computer as cyber code is projected on... | reuters.co... |
21.04.2021 | FireEye : Hackers use previously unknown vulnerability to ta... | WASHINGTON, April 20 (Reuters) - Hackers have targeted customers of California-based network service... | marketscre... |
21.04.2021 | Suspected Chinese agents have been hacking US government age... | A VPN logo seen on a smartphone. Not related to this story. Omar Marques/SOPA Images/LightRocket via... | businessin... |
20.04.2021 | Hackers are exploiting a Pulse Secure 0-day to breach orgs a... | Enlarge
CHUYN / Getty Images reader comments 71 with 52 posters participating
Share this story
Share... | arstechnic... |
13.04.2021 | Businesses get better at detecting cyber intrusions | The latest Mandiant M-Trends report from intelligence-led security company FireEye finds that busine... | betanews.c... |
30.03.2021 | What Would Happen If States Started Looking at Cyber Operati... | How are threats of force conveyed in cyberspace? When hackers compromised the SolarWinds Orion softw... | lawfareblo... |
24.03.2021 | RAPID7, INC.
Defending Against the Zero Day: Analyzing Atta... | In recent weeks, there has been quite a lot of reporting on the exploitation of the latest disclosed... | marketscre... |
16.03.2021 | Why traditional malware detection can’t stop the latest secu... | Getty Images/iStockphoto
Defending your organization against malware used to a matter of running the... | techrepubl... |
14.03.2021 | "Hack everybody you can": What to know about the m... | Cybersecurity responders are working around the clock to shore up networks hit by last week's hack o... | cbsnews.co... |
11.03.2021 | There’s a vexing mystery surrounding the 0-day attacks on Ex... | Enlarge
Getty Images reader comments 69 with 57 posters participating
Share this story
Share on Face... | arstechnic... |
10.03.2021 | Giant Datacenter Fire Takes Down Government Hacking Infrastr... | Hacking. Disinformation. Surveillance. CYBER is Motherboard's podcast and reporting on the dark unde... | vice.com/e... |
09.03.2021 | Is Hardsec the Future of Cybersecurity? | Ernest Hamilton, Tech Times 09 March 2021, 10:03 pm
(Photo : Is Hardsec the Future of Cybersecurity?... | techtimes.... |
09.03.2021 | Was SolarWinds a Different Type of Cyber Espionage? | The Biden administration announced that it will impose sanctions and other measures against Russia i... | lawfareblo... |
06.03.2021 | Warning: ‘Hundreds Of Thousands’ Of Microsoft Servers Hacked... | The Microsoft Exchange attacks could be a lot worse than initially thought, as reports suggest 'hund... | forbes.com... |
05.03.2021 | What’s Good for Litigation Isn’t Necessarily Good for Cybers... | When Guo Wengui fled to the United States from China in 2015, he hired the Clark Hill law firm to as... | lawfareblo... |
01.03.2021 | Four Reasons Breach And Attack Simulation Won’t Validate Sec... | VP, Strategy for Mandiant Security Validation, overseeing the company's product and business develop... | forbes.com... |
26.02.2021 | The Consequences Of Choosing Speed Over Security | Joel Wallenstrom is the CEO & President of Wickr and a world-renowned information security exper... | forbes.com... |
25.02.2021 | Here's the Big Problem With Too Much Trust | February 25, 2021 6 min read
Opinions expressed by Entrepreneur contributors are their own.
Zero Tru... | entreprene... |