NEWS

Sophos reports on the realities of ransomware

  • Published in

Sophos has published a multi-part research series on the realities of ransomware, including an industry-first detailed look at new detection evasion techniques in WastedLocker ransomware attacks that leverage the Windows Cache Manager and memory-mapped I/O to encrypt files. A complementary article examines the evasion-centric arms race of ransomware, providing a months-long review of how cybercriminals have been escalating and markedly changing evasion techniques, tactics and procedures (TTPs)...

Read More

NEWS

Almost all businesses feel impact of cyber attacks

  • Published in

Yet only four out of 10 security leaders in the UK can answer the question, “How secure, or at risk, are we?”

Read More

NEWS

Security analysts ready to quit

  • Published in

Half of first-time security analysts working in Security Operations Centres (SOCs) plan to leave after just three months in the job, according to a study* from SIRP Labs out today. Not one of them plans to stay in their current role for no longer than 18 months. Of all the security analysts interviewed nearly half (48%) of security analysts are considering leaving their role, within 11 months on average.

Read More

NEWS

Thycotic and Access 42 partner

  • Published in

With the partnership between Access42 and Thycotic, a big step is taken within the Netherlands to make end-users more aware in protecting the most vulnerable accounts within their organization.

Read More

NEWS

Tanium and Google Cloud join forces

  • Published in

Tanium has expanded its partnership with Google Cloud to help organizations accelerate the transformation to distributed business operations. This new offering, sold by Tanium, will help enterprises detect, investigate, and scope advanced, long-lived attacks (APTs), and includes an integration between Tanium’s Threat Response and Chronicle, Google Cloud’s security analytics platform.

Read More

NEWS

Malware attacks exploiting machine identities double in 12 months

  • Published in

Malware attacks abusing machine identities grew eightfold over the last 10 years.

Read More

‘Breakthrough’ solution addresses DNS server vulnerabilities.
Cloud Security Broker delivers 360-degrees user behaviour analytics, threat detection, compliance...
Radware®has announced the latest version of DefensePro® – a real-time, behavioural...
Lewis Silkin, one of the UK's top commercial law firms, is now a customer of Cybereason,
By Neil Chapman SVP & MD EMEA / International, ForgeRock.
Exploits – software that takes advantage of a bug or vulnerability – for Microsoft Office...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more