Network Security

Back to homepage

Security leaders lack confidence in the supply chain, fear third-party attacks

An overwhelming number of cybersecurity professionals (89%) have expressed concerns about the third-party managed service providers (MSPs) they partner with being hacked, according to new research from the Neustar International

MITRE ATT&CK framework: keep your friends close, but your enemies even closer

By Steve Rivers -Technical Director International at ThreatQuotient, For decades, security professionals have been stuck in a pattern of adding the latest technology or another threat feed to improve their

How to establish insider threat programmes and conduct investigations

By Josh Lefkowitz – CEO at FlashPoint, Insider threat remains high on the list of issues keeping CISOs awake at night, and for good reason. Unlike external actors, insiders are

Your IT is too Slow for Faster New Phishing Scams

By Atif Mushtaq – CEO at SlashNext, Successful phishing attacks depend on a quick response from users – and it’s working all too well. While many employees have some form

Victimology: in the shoes of a cybersecurity analyst

By Steve Rivers – Technical Director, International at ThreatQuotient A recent report from the government showed that 32% of businesses identified a cyber security attack in the last 12 months,

Millions of Email Servers at Risk from Cryptomining Worm

Researchers have spotted a major new cyber-attack campaign targeting millions of Linux email servers around the world with a cryptomining malware payload. Exim accounts for over half (57%) of the

Poor Password Management is Hurting Businesses Hard

Many firms are wasting a lot of time and money changing passwords. Every year, businesses in the United Kingdom spend more than two months resetting different passwords, which costs them

“Major Flaw” Discovered in Evernote’s Chrome Extension

A major flaw has been discovered in the code of the Web Clipper Chrome extension of note-taking service Evernote. The flaw, a universal XSS marked CVE-2019-12592 which could have allowed

How 5G Introduces New Security Vulnerabilities

The migration to 5G is underway with more hype than any IT innovation in history (at least it feels that way). Predictions about 5G’s potential have reached fever pitch, according

Healthcare Executives need to Make Cybersecurity a Business Priority

Risks associated with Internet of Things, medical devices, third-party vendors, and program management are top of mind for healthcare executives, according to a CynergisTek’s survey. The survey of approximately 60