3 Ways To Prepare For Cyber Attacks

Although there are countless ways to combat cyberattacks, in this article we are addressing 3 simple yet significant points that users can follow to protect their data. Cyber attacks are…

Ransomware gang targeting schools, hospitals reinvents itself to avoid scrutiny

Written by Tonya Riley Nov 29, 2021 | CYBERSCOOP An under-the-radar ransomware group that’s been attacking schools, hospitals and other critical infrastructure has tried to cover its tracks by rebranding,…

Attackers exploiting Windows Installer vulnerability despite patching

According to Cisco Talos, abusing the flaw would allow an attacker with limited access to get higher privileges and become an administrator. A Windows Installer security vulnerability, tracked as CVE-2021-41379,…

Clearlake Capital to Acquire Quest Software

Clearlake Capital to Acquire Quest Software Private equity firm Clearlake Capital Group LP has agreed to acquire Californian tech company Quest Software from its current owner, Francisco Partners.  The terms of the planned transaction have…

How To Secure Your Broadband?

Having an internet connection is very crucial whether you are using your desktop, phone, or smart TV. But if you are planning on availing of internet connectivity at a fixed…

Over 300,000 Android users have downloaded these banking trojan malware apps, say security researchers

Over 300,000 Android smartphone users have downloaded what have turned out to be banking trojans after falling victim to malware which has bypassed detection by the Google Play app store. …

Cloud-Native Security—What is it and Why it Matters

The term “cloud native” is turning up more and more in vendor promotions and news content, as a growing number of organizations devote more resources to the cloud and make…

Telcos to get expanded scam-blocking powers through telecommunications law amendment

The federal government has announced it will amend telecommunications legislation to provide telcos with the ability to block scam SMS messages.  “The regulatory amendment we have enacted provides the telecommunications…

'AI Will Revolutionize Every Aspect of Connectivity,' Argue Cyber Experts

'AI Will Revolutionize Every Aspect of Connectivity,' Argue Cyber Experts "AI will revolutionize every aspect of connectivity," was the bold message delivered during a recent webinar by the IDC titled 'AI…

How to build a proactive incident response plan

Organizations have long since relied on a reactive approach to cybersecurity. However, with the ever-increasing sophistication of tools for malicious actors, a reactive approach may lead to disaster. A single…