English News

Conti Ransomware Is Now Using ProxyShell Exploits to Compromise Exchange Servers

Conti Ransomware Is Now Using ProxyShell Exploits to Compromise Exchange Servers

ProxyShell Allows Unauthenticated, Remote Code Execution on Vulnerable Servers that Haven’t Been Mended. According to cybersecurity researchers, the Conti ransomware threat actor has been used […]
Gartner Identifies Four Trends Driving Near-Term Artificial Intelligence Innovation

Gartner Identifies Four Trends Driving Near-Term Artificial Intelligence Innovation

Responsible AI, Small and Wide Data, Operationalisation and Efficient Resource Use Will Be Key to Scaling AI Initiatives Four trends on the Gartner, Inc. Hype […]
Gartner Survey Reveals a 44% Rise in Workers’ Use of Collaboration Tools Since 2019

Gartner Survey Reveals a 44% Rise in Workers’ Use of Collaboration Tools Since 2019

Digital Workplace Technologies Will Be Essential for Enabling Innovation in a Hybrid Workforce   Nearly 80% of workers are using collaboration tools for work in 2021, […]
Fortinet delays patching zero-day allowing remote server takeover

Fortinet delays patching zero-day allowing remote server takeover

Fortinet has delayed patching a zero-day command injection vulnerability found in the FortiWeb web application firewall (WAF) until the end of August. Successful exploitation can […]
Onapsis Recognized Among the Fastest Growing Private Companies in the United States by Inc. Magazine

Onapsis Recognized Among the Fastest Growing Private Companies in the United States by Inc. Magazine

Fueled by strong demand for security solution that protects business-critical applications, Onapsis achieved 187% growth over the past three years Onapsis today announced it was […]
The T-Mobile Data Breach Is One You Can’t Ignore

The T-Mobile Data Breach Is One You Can’t Ignore

Hackers claim to have obtained the data of 100 million people—including sensitive personal information Not all data breaches are created equal. None of them are […]
5 Challenges for CIOs E-book

5 Challenges for CIOs E-book

The Chief Information Officer (CIO) holds responsibility for all IT decisions affecting the company, a task that has increased in complexity in recent years. This […]
Accenture responds to LockBit ransomware attack

Accenture responds to LockBit ransomware attack

The LockBit ransomware crew claims to have stolen data from IT services and consulting giant Accenture, but the company said no corporate or customer data […]
Vulnerability Summary for the Week of August 2, 2021

Vulnerability Summary for the Week of August 2, 2021

The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards and Technology (NIST) National Vulnerability […]
Routers and Modems Running Arcadyan Firmware Are Under Attack

Routers and Modems Running Arcadyan Firmware Are Under Attack

Routers and modems running a version of the Arcadyan firmware, including devices from ASUS, Orange, Vodafone, and Verizon, are currently under attack from a threat […]
Apple’s Plan to „Think Different“ About Encryption Opens a Backdoor to Your Private Life

Apple’s Plan to „Think Different“ About Encryption Opens a Backdoor to Your Private Life

Apple has announced impending changes to its operating systems that include new “protections for children” features in iCloud and iMessage. If you’ve spent any time […]
Prevention is Better Than Cure: The Ransomware Evolution

Prevention is Better Than Cure: The Ransomware Evolution

Ransomware tactics have continued to evolve over the years, and remain a prominent threat to both SMBs and larger organisations. Particularly during the peak of […]
Gartner Identifies Top 5 Business Trends in Manufacturing for 2021

Gartner Identifies Top 5 Business Trends in Manufacturing for 2021

Top Trends Include Digital and Product Experience, Data Monetisation and Ecosystem Partnerships Gartner, Inc. identified the top five business trends that will impact the global […]
Understanding the increase in Supply Chain Security Attacks

Understanding the increase in Supply Chain Security Attacks

The European Union Agency for Cybersecurity mapping on emerging supply chain attacks finds 66% of attacks focus on the supplier’s code. Supply chain attacks have […]
Chinese Hackers Implant PlugX Variant on Compromised MS Exchange Servers

Chinese Hackers Implant PlugX Variant on Compromised MS Exchange Servers

A Chinese cyberespionage group known for targeting Southeast Asia leveraged flaws in the Microsoft Exchange Server that came to light earlier this March to deploy […]
Telecom & Trust Services Incidents in 2020: System Failures on the Rise

Telecom & Trust Services Incidents in 2020: System Failures on the Rise

The European Union Agency for Cybersecurity publishes the aggregated data and analysis of the incident reports for telecom services and trust services. Incident reporting is […]