Category “Editorial”

New DGA Variants Spotted in Attacks

Monday, 16 May, 2016 | X

Researchers at endpoint security firm Cybereason have identified several new domain generation algorithm (DGA) variants currently used by malware and…

CISO Playbook: Games of War & Cyber Defenses

Monday, 16 May, 2016 | X

Limiting incident response planning to hypothetical table-top scenarios is far too risky in today’s threat environment. But with cyberwar gaming…

Work begins on Russian rival to Android

Monday, 16 May, 2016 | X

A Russian company called is developing its own mobile operating system to rival Android. Communications Minister Nikolai Nikiforov Tweeted a…

image

DoD Launches ‘Hack the Marine Corps’ Bug Bounty Program

Tuesday, 14 August, 2018 In General News, Top News

The U.S. Department of Defense on Monday announced the launch of “Hack the Marine Corps,” the organization’s sixth bug bounty…

Protect your Customer and Employee Accounts

Tuesday, 7 August, 2018 In Featured News, General News, Top News

  Find our more about Digital Shadows overview please click here

European workers showing security fatigue

Tuesday, 7 August, 2018 In Featured News, General News, Top News

Despite being fully aware of security risks following the introduction of high-profile legislation like GDPR, European workers have the worst…

How Bitcoin and the Dark Web hide SamSam in plain sight

Tuesday, 7 August, 2018 In General News, Other News

For two and a half years someone has been terrorising organisations by breaking in to their networks and infecting their…

The Importance of Access Control for IoT Devices

Tuesday, 7 August, 2018 In Featured News, General News

With the Right Safeguards in Place, IoT Devices Don’t Have to be Your Network’s Weakest Link Cybercriminals are actively increasing…

image
Latest Videos
Polls
Sorry no Polls available - check back soon