How do you know if you are protecting your real-time communication networks from unwanted calls coming in that appear to be valid, but in fact they are malicious attempts to tie up communication applications such as IVRs or PBX trunks with long call duration times?
Telephone Denial-of-Service (TDoS) attacks are...
Companies of all sizes are implementing VoIP solutions to better support globalized business and mobile workforces. VoIP adoption isn't showing any signs of slowing down, but implementation and management aren't without challenges.
Telephony infrastructures are subject to call diverting, rerouting, and...
Many ransomware-wielding attackers continue to hack into organizations via remote desktop protocol. But some Sodinokibi ransomware-as-a-service affiliates have shifted instead to targeting victims via botnets, saying hackers' use of RDP exploits has grown too common.
Sodinokibi/REvil appears to be making millions since it seized the ransomware-as-a-service mantle from GandCrab earlier this year. Security firm McAfee says up to 40 percent of every victim's ransom payment - average: $4,000 - gets remitted to the Sodinokibi actor, with "affiliates" keeping the rest.
Private-equity firm Thoma Bravo, which already has stakes in several cybersecurity companies, plans to buy U.K.-based security company Sophos in a $3.9 billion deal, the two companies announced Monday. The Sophos board will "unanimously recommend" the sale to shareholders, the company says.
Nation-state attackers have been targeting known flaws that customers have yet to patch in their Pulse Secure, Palo Alto and Fortinet VPN servers, Britain's National Cyber Security Center warns, adding that any organization that didn't immediately apply patches should review logs for signs of hacking.
The promise of cloud and mobility is to provide access to key services quickly and from anywhere at any time from any device. Security teams must embrace technologies that enable this to ensure business productivity. VPNs place users on the network and the DMZ mistakenly expose apps to the bad guys.
Zero trust network access technologies, also known as SDP, provide a secure alternative to legacy methods. For the first time, IT can decouple application access from network access and make private apps invisible to the internet.
Download this exclusive eBook and learn about:
Key capabilities of ZTNA...
The promise of cloud and mobility is to provide access to key services quickly and from anywhere at any time from any device. Zscaler's Lisa Lorenzin opens up on zero trust network access technologies, which provide a secure alternative to legacy methods.
Déjà vu basic cybersecurity challenge all over again: With the U.S. government warning that geopolitical tensions could trigger wiper-attack reprisals, security experts review the basic anti-wiper - and anti-ransomware - defenses organizations should already have in place.
Together with President Donald Trump and the EU Copyright Directive, the U.K's Internet Services Providers' Association has nominated Mozilla as one of its three nominees for "internet villain" of the year. Its purported crime has been to advance a more secure version of the domain name system.
Visibility, or a lack thereof, continues to challenge organizations as they attempt to protect their businesses by knowing which systems, applications and data they have, says AlgoSec's Jeffrey Starr. He discusses how centralized visibility, control and automation can help.
Digital transformation impacts the way that organizations deal with cybersecurity risk, says Tim Wilkinson of Avast Business, who provides advice on how to place security at the center of the transformation.
When you have limited resources and a large attack surface to protect, smart prioritization is crucial. Frameworks like the Center for Internet Security (CIS) Top 20 Critical Security Controls are designed to help you make those difficult decisions, but a framework is only useful if you've got the resources to follow...
The good news is: The development of new malware
exploits has slowed considerably. The bad news is:
That's because the old ones still continue to work so
Download this whitepaper to learn more about:
The new malware landscape;
How ransomware has matured;
How organizations can build resilience into...