English News

Unauthenticated Remote Code Execution in a wide range of DrayTek Vigor Routers

Unauthenticated Remote Code Execution in a wide range of DrayTek Vigor Routers

The Trellix Threat Labs Vulnerability Research team has found an unauthenticated remote code execution vulnerability, filed under CVE-2022-32548 affecting multiple DrayTek routers. The attack can […]
Telecom & Trust Services Incidents in 2021: Over-The-Top (OTT) Challenges Emerging

Telecom & Trust Services Incidents in 2021: Over-The-Top (OTT) Challenges Emerging

The European Union Agency for Cybersecurity (ENISA) releases today the 2021 incident reports on telecom and trust services. The 2021 reports: what are the key […]
Online Payment Fraud Losses to Exceed $343 Billion Globally Over the Next 5 Years, Juniper Research Study Finds

Online Payment Fraud Losses to Exceed $343 Billion Globally Over the Next 5 Years, Juniper Research Study Finds

A new study from Juniper Research has found cumulative merchant losses to online payment fraud globally between 2023 and 2027 will exceed $343 billion. As […]
SD-WAN: Why DDI is Key for Efficient Management

SD-WAN: Why DDI is Key for Efficient Management

As published in a recent article in SDxCentral based on research from MEF, both the SD-WAN and SASE markets show strong revenue and activity, but […]
Gartner Forecasts Worldwide PC Shipments to Decline 9.5% in 2022

Gartner Forecasts Worldwide PC Shipments to Decline 9.5% in 2022

Smartphone Shipments in Greater China Expected to Fall By 18% Worldwide PC shipments are on pace to decline 9.5% in 2022, according to the latest […]
82% Cyber Breaches in Verizon’s Report Preventable

82% Cyber Breaches in Verizon’s Report Preventable

Verizon recently released its 2022 Data Breach Investigations Report, giving businesses vital insights into the state of cybersecurity around the world. It contains an analysis […]
Fraunhofer IPMS develops CANsec Controller IP-Core CAN-SEC for more security in electronic vehicle systems

Fraunhofer IPMS develops CANsec Controller IP-Core CAN-SEC for more security in electronic vehicle systems

Modern vehicles have a large number of electronic systems that are networked with each other. Since these systems are at risk from cyber attacks, Fraunhofer […]
Gartner Forecasts Worldwide Government IT Spending to Grow 5% in 2022

Gartner Forecasts Worldwide Government IT Spending to Grow 5% in 2022

XaaS Will Emerge as New Area of Investments as Governments Scale Digital Transformation Initiatives Worldwide government IT spending is forecast to total $565.7 billion in […]
Back From the Dead, Emotet Returns in 2022

Back From the Dead, Emotet Returns in 2022

Emotet malware started from humble beginnings as a banking Trojan in 2014. The threat actors behind Emotet have been credited as one of the first […]
Gartner Highlights Three Ways Security Leaders Can Prepare for the Evolution of Cybersecurity Strategy, Roles and Technology

Gartner Highlights Three Ways Security Leaders Can Prepare for the Evolution of Cybersecurity Strategy, Roles and Technology

Analysts to Explore the Future of Cybersecurity at the Gartner Security & Risk Management Summit, 12-14 September in London As cybersecurity strategy, leadership and technologies […]
Kingston Digital Releases 4TB Capacity Addition to Pocket-Sized XS2000 Portable SSD

Kingston Digital Releases 4TB Capacity Addition to Pocket-Sized XS2000 Portable SSD

USB 3.2 Gen 2×2 performance + Portable durability Kingston Digital Europe Co LLP, a flash memory affiliate of Kingston Technology Company, Inc., a world leader […]
Hunting a Global Telecommunications Threat: DecisiveArchitect and Its Custom Implant JustForFun

Hunting a Global Telecommunications Threat: DecisiveArchitect and Its Custom Implant JustForFun

The security landscape is constantly developing to provide easier ways to establish endpoint visibility across networks through the use of endpoint detection and response (EDR) utilities. However, […]
Gartner Identifies Three Technology Trends Gaining Traction in Banking and Investment Services in 2022

Gartner Identifies Three Technology Trends Gaining Traction in Banking and Investment Services in 2022

Banks and Investment Firms Will Spend $623 Billion on Technology Products and Services in 2022 Banks will apply generative AI in growth areas such as […]
Ransomware: Is macOS more protected than Windows?

Ransomware: Is macOS more protected than Windows?

While it may be true that macOS computers are more secure than Windows-based machines, the advantage is less than you might think. Apple has done […]
Research paper: IceApple – A Novel Internet Information Services (IIS) Post-Exploitation Framework

Research paper: IceApple – A Novel Internet Information Services (IIS) Post-Exploitation Framework

CrowdStrike’s Falcon OverWatch proactive threat hunting has uncovered a sophisticated .NET-based post-exploitation framework, dubbed IceApple. The framework has been observed being deployed on Microsoft Exchange […]
Proactive Threat Hunting Bears Fruit: Falcon OverWatch Detects Novel IceApple Post-Exploitation Framework

Proactive Threat Hunting Bears Fruit: Falcon OverWatch Detects Novel IceApple Post-Exploitation Framework

The CrowdStrike Falcon OverWatch proactive threat hunting team has uncovered a sophisticated .NET-based post-exploitation framework, dubbed IceApple. Since OverWatch’s first detection in late 2021, the framework has […]
DDoS – Disrupting Mobile Users via CGNat

DDoS – Disrupting Mobile Users via CGNat

The current waves of DDoS attacks are becoming more sophisticated every year. In addition, according to the current Threat-Intel Report by NetSCOUT, more sophisticated attack […]
2022 A10 Networks DDoS Threat Report

2022 A10 Networks DDoS Threat Report

The Global State of DDoS Weapons DDoS attacks continue to find their way into headlines, from attackers leveraging the Log4j vulnerability to Microsoft mitigating one […]