English News

Ransomware: Is macOS more protected than Windows?

Ransomware: Is macOS more protected than Windows?

While it may be true that macOS computers are more secure than Windows-based machines, the advantage is less than you might think. Apple has done […]
Research paper: IceApple – A Novel Internet Information Services (IIS) Post-Exploitation Framework

Research paper: IceApple – A Novel Internet Information Services (IIS) Post-Exploitation Framework

CrowdStrike’s Falcon OverWatch proactive threat hunting has uncovered a sophisticated .NET-based post-exploitation framework, dubbed IceApple. The framework has been observed being deployed on Microsoft Exchange […]
Proactive Threat Hunting Bears Fruit: Falcon OverWatch Detects Novel IceApple Post-Exploitation Framework

Proactive Threat Hunting Bears Fruit: Falcon OverWatch Detects Novel IceApple Post-Exploitation Framework

The CrowdStrike Falcon OverWatch proactive threat hunting team has uncovered a sophisticated .NET-based post-exploitation framework, dubbed IceApple. Since OverWatch’s first detection in late 2021, the framework has […]
DDoS – Disrupting Mobile Users via CGNat

DDoS – Disrupting Mobile Users via CGNat

The current waves of DDoS attacks are becoming more sophisticated every year. In addition, according to the current Threat-Intel Report by NetSCOUT, more sophisticated attack […]
2022 A10 Networks DDoS Threat Report

2022 A10 Networks DDoS Threat Report

The Global State of DDoS Weapons DDoS attacks continue to find their way into headlines, from attackers leveraging the Log4j vulnerability to Microsoft mitigating one […]
NIST Updates Cybersecurity Guidance for Supply Chain Risk Management

NIST Updates Cybersecurity Guidance for Supply Chain Risk Management

The publication’s revisions form part of NIST’s response to an executive order regarding cybersecurity. A vulnerable spot in global commerce is the supply chain: It […]
12-Month DIB-VDP Pilot Concludes

12-Month DIB-VDP Pilot Concludes

The Defense Industrial Base-Vulnerability Disclosure Program (DIB-VDP) Pilot reaches the one-year mark and its conclusion at the end of April. The 12-month pilot, launched in […]
Analysis Shows Inherent Challenges of the Semiconductor Industry

Analysis Shows Inherent Challenges of the Semiconductor Industry

While the semiconductor supply chain is essential to our way of life, its safety is far from guaranteed. Nearly 60% of the global semiconductor industry […]
ETSI Releases First Report on the Role of Hardware in the Security of AI

ETSI Releases First Report on the Role of Hardware in the Security of AI

ETSI recently released a Group Report, ETSI GR SAI 006, outlining the role of hardware in the security of artificial intelligence (AI). AI hardware provides […]
Quantum leap for privacy: PureVPN brings power of Quantum-Resistant Encryption Keys to the masses

Quantum leap for privacy: PureVPN brings power of Quantum-Resistant Encryption Keys to the masses

Quantum computers will be able to override traditional encryption protocols, rendering them obsolete and not fit for purpose in the future. In collaboration with Quantinuum, […]
Gartner Forecasts Worldwide Semiconductor Revenue to Grow 13.6% in 2022

Gartner Forecasts Worldwide Semiconductor Revenue to Grow 13.6% in 2022

Component Supply Constraints Expected to Gradually Ease Through 2022 Global semiconductor revenue is projected to total $676 billion in 2022, an increase of 13.6% from […]
Gartner Forecasts Worldwide IT Spending to Reach $4.4 Trillion in 2022

Gartner Forecasts Worldwide IT Spending to Reach $4.4 Trillion in 2022

Rates of Inflation, Geopolitical Disruption and Talent Shortages Not Expected to Slow IT Investments Worldwide IT spending is projected to total $4.4 trillion in 2022, […]
SentinelOne Leads MITRE Engenuity ATT&CK with 100% Prevention, Detection, and Highest Scores

SentinelOne Leads MITRE Engenuity ATT&CK with 100% Prevention, Detection, and Highest Scores

Singularity XDR Leads For Third Consecutive Year Delivering Superior Visibility and Automation SentinelOne, an autonomous cybersecurity platform company, released its results from the fourth round […]
New TCG guidance simplifies creating cyber resilient devices

New TCG guidance simplifies creating cyber resilient devices

The prevention of cyber attacks throughout a device’s lifetime has been made easier today, as the Trusted Computing Group (TCG) released its specification: Cyber Resilient […]
DDoS as Attackvector for State-Sponsored/Hacktivist-Groups in Times of Crisis

DDoS as Attackvector for State-Sponsored/Hacktivist-Groups in Times of Crisis

The Russia-Ukraine war was flanked in cyberspace by a number of actions and attacks, some of which can be attributed to state actors, others to […]
cr8escape: New Vulnerability in CRI-O Container Engine Discovered by CrowdStrike (CVE-2022-0811)

cr8escape: New Vulnerability in CRI-O Container Engine Discovered by CrowdStrike (CVE-2022-0811)

Kubernetes and CRI-O release patch for vulnerability today; CrowdStrike customers protected CrowdStrike cloud security researchers discovered a new vulnerability (dubbed “cr8escape” and tracked as CVE-2022-0811) […]
Over half of London councils do not have cyber insurance

Over half of London councils do not have cyber insurance

17 London borough councils (52 percent) report that despite news of increased ransomware attacks, they do not have a cyber insurance policy in place A […]
Google to Acquire Mandiant

Google to Acquire Mandiant

Acquisition to bring Google speed and scale to Mandiant’s unparalleled intelligence and expertise – at a time when security has never been more important Mandiant, […]