Conti Ransomware Is Now Using ProxyShell Exploits to Compromise Exchange Servers
ProxyShell Allows Unauthenticated, Remote Code Execution on Vulnerable Servers that Haven’t Been Mended. According to cybersecurity researchers, the Conti ransomware threat actor has been used […]
Gartner Identifies Four Trends Driving Near-Term Artificial Intelligence Innovation
Responsible AI, Small and Wide Data, Operationalisation and Efficient Resource Use Will Be Key to Scaling AI Initiatives Four trends on the Gartner, Inc. Hype […]
Gartner Survey Reveals a 44% Rise in Workers’ Use of Collaboration Tools Since 2019
Digital Workplace Technologies Will Be Essential for Enabling Innovation in a Hybrid Workforce Nearly 80% of workers are using collaboration tools for work in 2021, […]
Fortinet delays patching zero-day allowing remote server takeover
Fortinet has delayed patching a zero-day command injection vulnerability found in the FortiWeb web application firewall (WAF) until the end of August. Successful exploitation can […]
Onapsis Recognized Among the Fastest Growing Private Companies in the United States by Inc. Magazine
Fueled by strong demand for security solution that protects business-critical applications, Onapsis achieved 187% growth over the past three years Onapsis today announced it was […]
The T-Mobile Data Breach Is One You Can’t Ignore
Hackers claim to have obtained the data of 100 million people—including sensitive personal information Not all data breaches are created equal. None of them are […]
5 Challenges for CIOs E-book
The Chief Information Officer (CIO) holds responsibility for all IT decisions affecting the company, a task that has increased in complexity in recent years. This […]
Accenture responds to LockBit ransomware attack
The LockBit ransomware crew claims to have stolen data from IT services and consulting giant Accenture, but the company said no corporate or customer data […]
Vulnerability Summary for the Week of August 2, 2021
The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards and Technology (NIST) National Vulnerability […]
Routers and Modems Running Arcadyan Firmware Are Under Attack
Routers and modems running a version of the Arcadyan firmware, including devices from ASUS, Orange, Vodafone, and Verizon, are currently under attack from a threat […]
Apple’s Plan to „Think Different“ About Encryption Opens a Backdoor to Your Private Life
Apple has announced impending changes to its operating systems that include new “protections for children” features in iCloud and iMessage. If you’ve spent any time […]
Prevention is Better Than Cure: The Ransomware Evolution
Ransomware tactics have continued to evolve over the years, and remain a prominent threat to both SMBs and larger organisations. Particularly during the peak of […]
Gartner Identifies Top 5 Business Trends in Manufacturing for 2021
Top Trends Include Digital and Product Experience, Data Monetisation and Ecosystem Partnerships Gartner, Inc. identified the top five business trends that will impact the global […]
Understanding the increase in Supply Chain Security Attacks
The European Union Agency for Cybersecurity mapping on emerging supply chain attacks finds 66% of attacks focus on the supplier’s code. Supply chain attacks have […]
Chinese Hackers Implant PlugX Variant on Compromised MS Exchange Servers
A Chinese cyberespionage group known for targeting Southeast Asia leveraged flaws in the Microsoft Exchange Server that came to light earlier this March to deploy […]
Telecom & Trust Services Incidents in 2020: System Failures on the Rise
The European Union Agency for Cybersecurity publishes the aggregated data and analysis of the incident reports for telecom services and trust services. Incident reporting is […]