Home Search

remote work - search results

If you're not happy with the results, please do another search
ONUS Log4j, Cryptocurrency Wallet Security

Threat Actors Targeting Crypto Wallets with ElectroRAT Malware Campaign

0
Security researchers from Intezer discovered a wide-ranging marketing campaign targeting cryptocurrency holders to pilfer their private keys and compromise their crypto wallets. Threat actors...
PhantomLance Targets Android App Store to Spread Malware and Spyware, message encryption for Android

Google Rolls Out January 2021 Android Security Update

0
Google has started rolling out security fixes with its January 2021 security updates for Android devices.  The latest security fixes will address 42 vulnerabilities...
Threat Alert! Attackers Use Malicious Email Accounts to Launch BEC Attacks

How NTT Ltd. in India is Protecting WFH Employees from BEC Attacks During the...

0
NTT Ltd. Global Threat Intelligence Center (GTIC) publishes a Monthly Threat Report based on its observations and research. Its October 2020 report featured an...
1 in 3 CISOs feel biggest challenge of endpoint solution is its complexity

Are You a Thought Leader CISO? [INFOGRAPHIC]

0
Information security is a growing concern for small and big businesses alike. While we do everything we can in our power to protect the...
Fortinet VPNs Vulnerability

CISA Alerts About Path Traversal Vulnerability in Fortinet VPNs

0
The Cybersecurity and Infrastructure Security Agency (CISA) is warning users about the potential password leaks on Fortinet devices. In an official notification, the agency...
Endpoint security goes beyond technology and requires a mindset change, says Prateek Bhajanka, Senior Principal Analyst, Gartner. He says CISOs and Security leaders must be able to respond to an attack in a timely manner, and not focus only on prevention.

Endpoint Security is a Lot More Than Just Technology: Gartner

0
Speaking to CISO MAG, Prateek Bhajanka, Senior Principal Analyst, Gartner explains why endpoints have suddenly become so important in the realm of enterprise network...
NCSC

State Actors Using MobileIron’s Vulnerability to Target UK Organizations: NCSC

0
In June 2020, MobileIron reported a critical RCE vulnerability registered under CVE-2020-15505. The vulnerability was fixed in its security update released on June 15,...
Endpoint Security

Third-Party Risk: Reactive to Predictive

0
Third-party risk management: the process, technology, and people whose goal is to lower the risk created by third-parties (vendors).  Surveys of a wide range...
Beware! Counterfeit Cisco Switches Bypass Network Authentication

Cisco Fixes Multiple Vulnerabilities in Cisco Security Manager

0
In response to the multiple Cisco Security Manager vulnerabilities reported by security researcher Florian Hauser, the networking device manufacturer has published three advisories. The...
Ransomware attacks, ransomware, Sinclair Broadcast group

Ransomware Attacks Continue to Impact Digital and Security Transformation

0
A recent survey from CrowdStrike highlighted the continued spread of ransomware and the need for acceleration of both digital and security transformation. In its...