The Latest in IT Security

Posts Tagged ‘Cyber’

Pawn Storm, the long-standing economic and political #cyber–#espionage operation that has been first detailed in October 2014, continues unabated. Aiming to compromise the targets’ computers and Outlook accounts, the attackers send spear-phishing emails carrying malware and compromise websites to redirect to exploits that will deliver malware (in both cases the SEDNIT/Sofacy Trojan), or trick them […]

Read more ...

#ibm has joined an increasing number of vendors who are pushing for real-time cybersecurity information sharing among private and public organizations, researchers and other #network defenders. On Thursday, the company opened up over 700 terabytes of #data about vulnerabilities, attacks and other threats through a new cloud-based #threat intelligence sharing platform called IBM X-Force Exchange. […]

Read more ...

The proliferation of more than 16 billion connected computing devices today has significantly expanded the #attack surface of our interconnected world. Unauthorized, BYOD, vulnerable Internet of Things (IoT) devices, and a rapidly expanding market of low-cost, plug-and-play, cyber espionage devices represent an emerging threat vector and nefarious counterpart to the IoT: the Internet of Evil […]

Read more ...


Categories

MONDAY, FEBRUARY 24, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments