English News

EU Boost against cyberattacks: EU Agency for Cybersecurity welcomes proposal for the Joint Cyber Unit

EU Boost against cyberattacks: EU Agency for Cybersecurity welcomes proposal for the Joint Cyber Unit

The European Union Agency for Cybersecurity welcomes the European Commission proposal to launch the new Joint Cyber Unit which will act as a platform to […]
NSA Funds Development, Release of D3FEND

NSA Funds Development, Release of D3FEND

D3FEND, a framework for cybersecurity professionals to tailor defenses against specific cyber threats is now available through MITRE.  NSA funded MITRE’s research for D3FEND to […]
2021 CISO Report – CISOs agree: Traditional application security measures are broken

2021 CISO Report – CISOs agree: Traditional application security measures are broken

The need to innovate faster and shift to cloud-native application architectures isn’t just driving complexity, it’s creating significant vulnerability blind spots. Download the free report […]
Clop (Cl0p) Ransomware Gang Currently Claims 57 Victims on Leak Site, as Six Clop Gang Members Arrested in Ukraine Today

Clop (Cl0p) Ransomware Gang Currently Claims 57 Victims on Leak Site, as Six Clop Gang Members Arrested in Ukraine Today

News broke earlier today that six members of the Clop (CIOp) Ransomware gang were arrested in Kiev, Ukraine, and in surrounding towns earlier today by the Cyber […]
RockYou2021: largest password compilation of all time leaked online with 8.4 billion entries

RockYou2021: largest password compilation of all time leaked online with 8.4 billion entries

What seems to be the largest password collection of all time has been leaked on a popular hacker forum. A forum user posted a massive […]
Siloscape: First Known Malware Targeting Windows Containers to Compromise Cloud Environments

Siloscape: First Known Malware Targeting Windows Containers to Compromise Cloud Environments

Executive Summary In March 2021, I uncovered the first known malware targeting Windows containers, a development that is not surprising given the massive surge in […]
Ivanti Neurons for ITSM now integrates with Citrix Workspace to Deliver a Personalized Employee Experience in the Everywhere Workplace

Ivanti Neurons for ITSM now integrates with Citrix Workspace to Deliver a Personalized Employee Experience in the Everywhere Workplace

Customers can now benefit from reduced help desk ticket volumes and higher accuracy to improve employee productivity Ivanti, the automation platform that discovers, manages, secures, […]
New Research Shows 75% of APAC Organisations believe Zero Trust Frameworks Are Very Important Following COVID‑19

New Research Shows 75% of APAC Organisations believe Zero Trust Frameworks Are Very Important Following COVID‑19

Study uncovers C-level attitudes on secure access as enterprises embrace the Everywhere Workplace Ivanti Inc., the automation platform that makes every IT connection smarter and […]
Ivanti Velocity Web Browser, Velocity Telnet (TE) and Ivanti Speakeasy Now Available on SAP Store

Ivanti Velocity Web Browser, Velocity Telnet (TE) and Ivanti Speakeasy Now Available on SAP Store

By integrating with SAP Extended Warehouse Management, the Ivanti solutions enable supply chain customers to speed operations, reduce risks, and increase productivity Ivanti Wavelink, the […]
Intel fixes 73 vulnerabilities in June 2021 Platform Update

Intel fixes 73 vulnerabilities in June 2021 Platform Update

Intel has addressed 73 security vulnerabilities as part of the June 2021 Patch Tuesday, including high severity ones impacting some versions of Intel’s Security Library […]
CISA Releases Best Practices for Mapping to MITRE ATT&CK

CISA Releases Best Practices for Mapping to MITRE ATT&CK

As part of an effort to encourage a common language in threat actor analysis, CISA has released Best Practices for MITRE ATT&CK Mapping. The guide […]
New Partner Applications to Accelerate Your SOC’s Security Transformation

New Partner Applications to Accelerate Your SOC’s Security Transformation

Every security operations center (SOC) is different and has unique traits; however, most share similar challenges. Each SOC has its own set of security tools, […]
New Poisoned Installers Could Be Used In Supply Chain Attacks – NobleBaron

New Poisoned Installers Could Be Used In Supply Chain Attacks – NobleBaron

Executive Summary In late May, 2021, Microsoft and Volexity released public reports detailing recent Nobelium activity. Nobelium is suspected to be the new face of […]
MITRE Engenuity ATT&CK Evaluation

MITRE Engenuity ATT&CK Evaluation

SentinelOne Participates for the Third Year with Record Performance Introduction: MITRE Engenuity continues to drive the cybersecurity industry forward for the better with the third […]
Fujitsu suspends ProjectWEB platform after Japanese government hacks

Fujitsu suspends ProjectWEB platform after Japanese government hacks

Japanese tech giant Fujitsu has temporarily taken down its ProjectWEB enterprise software-as-a-service (SaaS) platform after hackers gained access to its systems and stole files belonging […]
Now Your Car is a Cybersecurity Risk, Too

Now Your Car is a Cybersecurity Risk, Too

The automotive industry started taking cybersecurity seriously about six years ago and started investing in designing and deploying cybersecurity solutions. The auto industry is now […]