English News

Critical Cisco Flaws Open VPN Routers Up to RCE Attacks

Critical Cisco Flaws Open VPN Routers Up to RCE Attacks

The vulnerabilities exist in Cisco’s RV160, RV160W, RV260, RV260P, and RV260W VPN routers for small businesses. Mit dem Laden des Tweets akzeptieren Sie die Datenschutzerklärung […]
Highlights of the Cybersecurity Standardisation Conference

Highlights of the Cybersecurity Standardisation Conference

The 2021 edition of the Conference presented the developments and upcoming challenges in European standardisation under the Cybersecurity Act. The European Standards Organisations, CEN, CENELEC […]
Ransomware Newcomers Include Pay2Key, RansomEXX, Everest

Ransomware Newcomers Include Pay2Key, RansomEXX, Everest

Maze May Have Exited, But Fresh Gangs Arrive Bearing Dedicated Data-Leaking Sites https://www.bankinfosecurity.co.uk/ransomware-newcomers-include-pay2key-ransomexx-everest-a-15908     […]
3 New Severe Security Vulnerabilities Found In SolarWinds Software

3 New Severe Security Vulnerabilities Found In SolarWinds Software

Cybersecurity researchers on Wednesday disclosed three severe security vulnerabilities impacting SolarWinds products, the most severe of which could have been exploited to achieve remote code […]
Zero-day vulnerability in SonicWall products actively exploited in the wild

Zero-day vulnerability in SonicWall products actively exploited in the wild

The warning comes following a cyber-attack on the network security company last month A zero-day vulnerability in SonicWall enterprise security products is being actively exploited […]
So, What’s So Special About the Newest Ransomware?

So, What’s So Special About the Newest Ransomware?

We were just a few days into the new year. We had hoped that this year will definitely be our year. We had hoped that […]
Android Gets Its New Malware for the Year

Android Gets Its New Malware for the Year

Not a day goes by without a piece of malware news. Today is no exception. A new family of Android ransomware has been revealed by […]
5G Cybersecurity (Preliminary Draft)

5G Cybersecurity (Preliminary Draft)

Announcement NIST’s National Cybersecurity Center of Excellence (NCCoE) has posted for comment a preliminary draft—the first of three volumes of an upcoming practice guide on 5G cybersecurity. […]
World’s most dangerous malware EMOTET disrupted through global action

World’s most dangerous malware EMOTET disrupted through global action

Law enforcement and judicial authorities worldwide have this week disrupted one of most significant botnets of the past decade: EMOTET. Investigators have now taken control […]
International Action Targets Emotet Crimeware

International Action Targets Emotet Crimeware

Authorities across Europe on Tuesday said they’d seized control over Emotet, a prolific malware strain and cybercrime-as-service operation. Investigators say the action could help quarantine more […]
Biometric data: 50 countries ranked by how they’re collecting it and what they’re doing with it

Biometric data: 50 countries ranked by how they’re collecting it and what they’re doing with it

From passport photos to accessing bank accounts with fingerprints, the use of biometrics is growing at an exponential rate. And while using your fingerprint may […]
Web Application Attacks on Healthcare Spike 51% As COVID-19 Vaccines are Introduced

Web Application Attacks on Healthcare Spike 51% As COVID-19 Vaccines are Introduced

As the first vials of COVID-19 vaccines were disseminated in December, Imperva Research Labs monitored an astounding 51% increase in web application attacks on healthcare targets. The […]
BeyondCorp Enterprise: Introducing a safer era of computing

BeyondCorp Enterprise: Introducing a safer era of computing

Security issues continue to disrupt the status quo for global enterprises. Recent incidents highlight the need to re-think our security plans and operations; attackers are […]
Russian hack of US agencies exposed supply chain weaknesses

Russian hack of US agencies exposed supply chain weaknesses

The elite Russian hackers who gained access to computer systems of federal agencies last year didn’t bother trying to break one by one into the […]
Generali Global Assistance Provides 2020 Identity & Cyber Protection Recap, Sees Significant Increase in ID Theft Cases

Generali Global Assistance Provides 2020 Identity & Cyber Protection Recap, Sees Significant Increase in ID Theft Cases

80% YoY increase in the number of ID Theft Resolution cases + 220% increase in the number of ID Monitoring inquiries + 5,630% increase in […]
Performance Navigator vs. IBM PM400

Performance Navigator vs. IBM PM400

How does Performance Navigator compare to IBM PM for Power Systems? IBM Performance Management for Power Systems (a.k.a. PM400 or PM for Power Systems) was […]