Despite lagging in technology adoption, African and Middle Eastern organizations are catching up, driven by smartphone acceptance and national identity systems. Go to Source Author: Robert Lemos, Contributing Writer
Category Archives: Uncategorized
Web infrastructure and security company Cloudflare on Tuesday said it detected and blocked a 5.6 Terabit per second (Tbps) distributed denial-of-service (DDoS) attack, the largest ever attack to be reported to date. The UDP protocol-based attack took place on October 29, 2024, targeting one of its customers, an unnamed internet service provider (ISP) from Eastern […]
In a letter sent today, the acting DHS secretary terminated membership to all advisory boards, including the Cyber Safety Review Board (CSRB) tasked with investigating state-sponsored cyber threats against the US. Go to Source Author: Becky Bracken, Senior Editor, Dark Reading
Sophos noted more than 15 attacks have been reported during the past three months. Go to Source Author: Kristina Beek, Associate Editor, Dark Reading
The advanced persistent threat (APT) group is likely India-based and targeting individuals with connections to the country’s intelligence community. Go to Source Author: Jai Vijayan, Contributing Writer
The company reports that it is not experiencing any operational issues within its business, so far. Go to Source Author: Kristina Beek, Associate Editor, Dark Reading
Two separate campaigns are targeting flaws in various IoT devices globally, with the goal of compromising them and propagating malware worldwide. Go to Source Author: Elizabeth Montalbano, Contributing Writer
Even as the rule book changes, the profession of the CISO remains unchanged: protecting their organization in a world of constant, continually evolving threats. Go to Source Author: Marene Allison
Cybersecurity researchers have warned of a new large-scale campaign that exploits security flaws in AVTECH IP cameras and Huawei HG532 routers to rope the devices into a Mirai botnet variant dubbed Murdoc_Botnet. The ongoing activity “demonstrates enhanced capabilities, exploiting vulnerabilities to compromise devices and establish expansive botnet networks,” Qualys security researcher Shilpesh Go to Source […]
