Crypto Mining Malware On The Rise
As the use of Bitcoin and other crypto currency continues to grow, cyber criminals are learning how to capture a portion of the transaction....
3 out of 5 people experienced a tech support scam in past year says...
Tech support scams are a problem worldwide, with 3 out of 5 people having experienced one in the past year and 1 in 5...
Barrier1 Introduces $99.00 Month Monitoring To Test Your Security Solution
The World is spending Millions of dollars for various forms of cyber protection and yet cyber-attacks of all kinds still are still getting through....
Tufin Launches First of Its Kind Program for MSSPs to Better Manage and Protect...
Tufin, the market-leading provider of Network Security Policy Orchestration solutions, today launched its Managed Security Service Provider (MSSP) Program, enabling MSSPs to offer “Tufin as a...
Kaspersky Web Traffic Security Arms Businesses with First Line of Defense Against Web-Based Attacks
Kaspersky Lab is announcing the availability of a new application in the Kaspersky Security for Internet Gateway solution, Kaspersky Web Traffic Security, which reinforces...
Sophos Adds Endpoint Detection and Response to Intercept X Advanced
Sophos, a global leader in network and endpoint security, announced that it has added Endpoint Detection and Response (EDR) to its Intercept X endpoint...
RDP Cyber Attacks In The Rise?
Cyber Attacks using RDP (Remote Desktop Protocol) are not new but they are on the rise. When you review why and what RDP was...
Could The Hacking Of 50 Million Facebook Users Been Prevented?
I reached out to one of our contributors (Jim Libersky) to our news column “Daily Breech” to get his thoughts on the recent Facebook...
ESET Researchers Discover First UEFI Rootkit Used In Cyberattack
The research team based in Montreal, discovered a cyberattack that used a UEFI rootkit to establish a presence on the victims’ computers, the first-ever in-the-wild. Dubbed...
Barrier 1 Blocks Hacker In Microseconds
Barrier1 is already doing what all security platforms must be doing to block hacker attacks. If you cannot identify and block and attract in...