The Marketplace
Home Page Banner

The Marketplace

Advisory & Consulting
Home Page Banner

Advisory & Consulting

Events Calendar
Home Page Banner

Events Calendar

CCME BYTE
Home Page Banner

CCME BYTE

LATEST NEWS

Security Staffing Low in Midsized and Large Orgs One of the greatest security challenges for midsized to large organizations is

Introduction In 2016, researchers from the University of Illinois left 297 unlabelled USB flash drives around the university campus to

Security experts from Palo Alto Networks have collected evidence that links the recently discovered NOKKI malware to North Korea-Linked APT.

Malware Less Common in Q2, Still Top Attack Method Despite malware attacks becoming less common since Q1 2018, they are

Financial Sector Breaches Have Tripled Since 2016 US financial services firms suffered three-times more data breaches in the first six

Some common malware will attempt to gather information about its environment, such as public IP address, Language, and Location. System

Password Security Better, Still Poses Business Risk Today marks the start of National Cybersecurity Awareness Month (NCSAM), and LastPass by

Endpoint protection began life as signature-based antivirus programs sitting on endpoints themselves. Over the years, the science of endpoint protection

Threats are constantly evolving and, just like everything else, tend to follow certain trends. Whenever a new type of threat

This March, as Facebook was coming under global scrutiny over the harvesting of personal data for Cambridge Analytica, Google discovered

Security experts from Qihoo 360 NetLab spotted GhostDNS, a malware that already infected over 100K+ devices and targets 70+ different types

Earlier this year, I wrote about what security professionals need to do to prepare for the upcoming Google distrust deadline. I

Torii – you might not have heard the name yet, but this new botnet has advanced techniques and persistence and

According to malware researchers from Proofpoint, DanaBot attackers launched a new campaign aimed at banks in the United States. A couple

Experts at the Cybaze Z-Lab have analyzed the latest iteration of the infamous GandCrab ransomware, version 5.0. Malware researchers at

SQL injection definition Structured Query Language (SQL) injection is a type of attack that can give an adversary complete control

Checkpoint experts discovered in the Dark Web an online builder, dubbed Gazorp, that allows crooks to create customized binaries for the Azorult malware.

At its height, the AlphaBay dark web market had 40,000 vendors, more than 400,000 users, and was facilitating more than

 
 

IT Security

Symantec introduced Email Threat Isolation, a new solution targeting to protect users against spear phishing, credential theft, account takeover and

Dell EMC unveiled its latest Integrated Data Protection Appliance (IDPA), the Dell EMC IDPA DP4400, providing simple and powerful converged

A cryptocurrency is a digital or virtual currency designed to work as a medium of exchange. It uses cryptography to

TELECOM SECURITY

IoT Devices at a Risk

Security researchers at Senrio, an IoT focused security firm, have a discovered a stack buffer overflow vulnerability (CVE-2017-9765) in an

News of the second Kmart credit-card breach in three years at the retailer and the number of breaches at financial

VoIP, short for Voice over Internet Protocol, allows businesses to make free, or very low-cost, telephone calls over the Internet.

Industrial & OT Security

Nearly 60% of surveyed organizations using SCADA or ICS reported they experienced a breach in those systems in the last

Microsoft last week unveiled Trusted Cyber Physical Systems (TCPS), a new solution designed to help protect critical infrastructure against modern

Kaspersky-OS

On a day by day basis do IOT (Internet of Things) and SCADA become more integrated in our lives. However,

CLOUD SECURITY

Hewlett Packard Enterprise is looking to realign channel partners in Europe around the cloud and shift their mindset from selling

New AES-256 encryption for data at rest, more efficient storage APIs and a revamped Storage Explorer app are among Azure

Citing sources familiar with Apple’s plans, The Wall Street Journal on Tuesday reported that while preparations for a more secure

 


____________________________________________________

Sign up for our newsletter and get access to our latest cyber security news, industry through-leadership, latest information about security products and solution, security conferences and events.

Email address
Secure and Spam free...