English News

A Security-by-Design Approach to Protecting Your Business-Critical Applications

A Security-by-Design Approach to Protecting Your Business-Critical Applications

98% OF THE FORTUNE 100 USE SAP OR ORACLE EBS +  77% OF THE WORLD’S TRANSACTION REVENUE TOUCHES THESE ERP SYSTEMS We have seen an escalation […]
Critical Controls for SAP Implementation

Critical Controls for SAP Implementation

The Critical Controls Implementation for SAP is the first document in a series of implementation documents from the ERP working group that focuses on specific […]
5 Reasons Why You Need Vulnerability Management for Business-Critical Applications

5 Reasons Why You Need Vulnerability Management for Business-Critical Applications

Attacks targeting the applications at the core of your business — finance, manufacturing, human resources, sales, supply chain management — are on the rise. And […]
SAP Security Patch Day September 2021: SAP NetWeaver AS JAVA Affected by Several HotNews Vulnerabilities

SAP Security Patch Day September 2021: SAP NetWeaver AS JAVA Affected by Several HotNews Vulnerabilities

Highlights of September SAP Security Notes analysis include: September Summary – 21 new and updated SAP security patches released, including seven HotNews Notes and two […]
SSD-Assisted Ransomware Detection and Data Recovery Techniques

SSD-Assisted Ransomware Detection and Data Recovery Techniques

Abstract: As ransomware attacks have been prevalent, it becomes crucial to make anti-ransomware solutions that defend against ransomwares. In this article, we propose a new […]
BrakTooth: security researchers reveal 16 serious Bluetooth flaws affecting billions of devices

BrakTooth: security researchers reveal 16 serious Bluetooth flaws affecting billions of devices

Security researchers from the Singapore University of Technology and Design have disclosed a new family of security vulnerabilities in commercial Bluetooth stacks used in billions […]
Conti Ransomware Is Now Using ProxyShell Exploits to Compromise Exchange Servers

Conti Ransomware Is Now Using ProxyShell Exploits to Compromise Exchange Servers

ProxyShell Allows Unauthenticated, Remote Code Execution on Vulnerable Servers that Haven’t Been Mended. According to cybersecurity researchers, the Conti ransomware threat actor has been used […]
Gartner Identifies Four Trends Driving Near-Term Artificial Intelligence Innovation

Gartner Identifies Four Trends Driving Near-Term Artificial Intelligence Innovation

Responsible AI, Small and Wide Data, Operationalisation and Efficient Resource Use Will Be Key to Scaling AI Initiatives Four trends on the Gartner, Inc. Hype […]
Gartner Survey Reveals a 44% Rise in Workers’ Use of Collaboration Tools Since 2019

Gartner Survey Reveals a 44% Rise in Workers’ Use of Collaboration Tools Since 2019

Digital Workplace Technologies Will Be Essential for Enabling Innovation in a Hybrid Workforce   Nearly 80% of workers are using collaboration tools for work in 2021, […]
Fortinet delays patching zero-day allowing remote server takeover

Fortinet delays patching zero-day allowing remote server takeover

Fortinet has delayed patching a zero-day command injection vulnerability found in the FortiWeb web application firewall (WAF) until the end of August. Successful exploitation can […]
Onapsis Recognized Among the Fastest Growing Private Companies in the United States by Inc. Magazine

Onapsis Recognized Among the Fastest Growing Private Companies in the United States by Inc. Magazine

Fueled by strong demand for security solution that protects business-critical applications, Onapsis achieved 187% growth over the past three years Onapsis today announced it was […]
The T-Mobile Data Breach Is One You Can’t Ignore

The T-Mobile Data Breach Is One You Can’t Ignore

Hackers claim to have obtained the data of 100 million people—including sensitive personal information Not all data breaches are created equal. None of them are […]
5 Challenges for CIOs E-book

5 Challenges for CIOs E-book

The Chief Information Officer (CIO) holds responsibility for all IT decisions affecting the company, a task that has increased in complexity in recent years. This […]
Accenture responds to LockBit ransomware attack

Accenture responds to LockBit ransomware attack

The LockBit ransomware crew claims to have stolen data from IT services and consulting giant Accenture, but the company said no corporate or customer data […]
Vulnerability Summary for the Week of August 2, 2021

Vulnerability Summary for the Week of August 2, 2021

The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards and Technology (NIST) National Vulnerability […]
Routers and Modems Running Arcadyan Firmware Are Under Attack

Routers and Modems Running Arcadyan Firmware Are Under Attack

Routers and modems running a version of the Arcadyan firmware, including devices from ASUS, Orange, Vodafone, and Verizon, are currently under attack from a threat […]
Apple’s Plan to “Think Different” About Encryption Opens a Backdoor to Your Private Life

Apple’s Plan to “Think Different” About Encryption Opens a Backdoor to Your Private Life

Apple has announced impending changes to its operating systems that include new “protections for children” features in iCloud and iMessage. If you’ve spent any time […]
Prevention is Better Than Cure: The Ransomware Evolution

Prevention is Better Than Cure: The Ransomware Evolution

Ransomware tactics have continued to evolve over the years, and remain a prominent threat to both SMBs and larger organisations. Particularly during the peak of […]