‘Tropic Trooper’ Reemerges to Target Transportation Outfits

Analysts warn that the attack group, now known as ‘Earth Centaur,’ is honing its attacks to go after transportation and government agencies. They’ve been an active threat group since 2011,…

In 2022, Expect More Supply Chain Pain and Changing Security Roles

If 2021 was the Year of Supply Chain Pain, 2022 will be the Year of Supply Chain Chronic Pain (or something worse than pain). This past year, the pain was…

Microsoft releases end-to-end encryption for Teams calls

Credit: Microsoft Microsoft announced today that it is rolling out end-to-end encryption (E2EE) for one-to-one Teams calls.  According to Microsoft’s blog post announcing general availability, admins will have the option…

The Ransomware Attack Suffered by Kronos May Cause Weeks of Downtime

Kronos is a workforce management and human resources company that offers cloud-based solutions for timekeeping, payroll, employee benefits, analytics, and other tasks. Kronos merged with Ultimate Software in 2020 to…

Australia's first data strategy to create 'one-stop shop' for accessing government data

A new data strategy was announced by the federal government on Tuesday morning, outlining a goal for Australia to have a modern, data-driven society by 2030. The data strategy, a…

Australia's first data strategy to create 'one-stop shop' for accessing government data

A new data strategy was announced by the federal government on Tuesday morning, outlining a goal for Australia to have a modern, data-driven society by 2030. The data strategy, a…

This decade-old malware has picked up some nasty new tricks

Qakbot, a top trojan for stealing bank credentials, has in the past year started delivering ransomware and this new business model is making it harder for network defenders to detect…

What Is a Virtual Patch and Why You Need It

Software vulnerabilities are one of the biggest nuisances for cybersecurity because cybercriminals love to exploit them. Read on to find out how you can be one step ahead by applying…

Best VPNs for small and home-based businesses in 2021

I recently had a friendly discussion with a marketing guy who contended that the term “small business” didn’t apply to home-based businesses because small businesses have between a hundred and…

Misconfigured Kafdrop Instances Lead to Sensitive Data Exposure for Many Companies

A new report shows how cloud misconfiguration could lead to critical data exposure of an organization. Researchers revealed that misconfigured Kafdrop instances, Kafdrop being the Apache Kafkas’s management interface, led…