Magazine Button
 
 

Research reveals growing use of IoT devices in DDoS attacks

A10 Networks has announced the findings of a new report into the state of Distributed Denial of Service (DDoS) attack weapons and targets, showcasing the growing use of IoT devices in synchronised attacks on targets globally. The report describes the significant potential for attackers to use an IoT-related protocol, the Constrained Application Protocol (CoAP), deployed on IoT devices to marshal attacks. The A10 Networks report on the state of DDoS weapons...

Read More

Research reveals growing use of IoT devices in DDoS attacks

A10 Networks has announced the findings of a new report into the state of Distributed Denial of Service (DDoS) attack weapons and targets, showcasing the growing use of IoT devices in synchronised attacks on targets globally. The report describes the significant potential for attackers to use an IoT-related protocol, the Constrained Application Protocol (CoAP), deployed on IoT devices to marshal attacks. The A10 Networks report on the state of DDoS weapons...

Read More

Industry experts comment on Norsk Hydro cyberattack

Norsk Hydro, a global aluminium and renewable energy company based in Norway, has been hit by an extensive cyberattack. IT-systems in most business areas have been impacted and the company has switched to manual operations and procedures as far as possible. In a statement, the company said its technical team, with external support, has succeeded in detecting the root cause of the problems and is working to validate the plan...

Read More
 

Latest Threats

ManageEngine adds user and entity behaviour analytics to SIEM solution

ManageEngine, the real-time IT management company, has announced that it has introduced user and entity behavior analytics (UEBA) into its SIEM solution, Log360. With score-based risk assessment, threat corroboration, anomaly detection powered by Machine Learning, and other new capabilities, the Log360 UEBA add-on helps security professionals identify, qualify, and investigate internal threats and...

Read more

Bromium warns of malicious email attachments in run up to Christmas

Bromium, a pioneer and leader in application isolation and containment for endpoint protection that stops advanced malware attacks, has warned organisations of the threat posed by hackers delivering malware via email attachments in the run up to Christmas. This comes after Bromium recorded a spike in the number of malicious...

Read more

Check Point announces general availability of CloudGuard SaaS

Check Point has announced the general availability of CloudGuard SaaS, an industry-first cloud suite designed to prevent sophisticated security threats that target SaaS applications. One of the latest additions to Check Point’s CloudGuard portfolio of cloud security products, CloudGuard SaaS protects enterprises that use SaaS applications and cloud-based email (including...

Read more

Latest Whitepapers

 

Events

  • Mon
    01
    Apr
    2019
    Wed
    03
    Apr
    2019

    GISEC 2019

    Dubai World Trade Centre, UAE
  • Tue
    04
    Jun
    2019
    Thu
    06
    Jun
    2019

    Infosecurity Europe 2019

    Olympia, London
  • Sun
    06
    Oct
    2019
    Thu
    10
    Oct
    2019

    GITEX Technology Week

    Dubai World Trade Centre
 
 
kuwait

Get to know

 

Deep Dive

7th February 2019

Industry experts discuss how best to secure a remote workforce

The modern workforce is more flexible and dynamic than ever before, with technology enabling employees to work from anywhere, at any time, on any device. But these new remote workforces...

17th January 2019

Get to Know Your Customer Day – seven business-critical outcomes

Observed annually on the third Thursday of every quarter, ‘Get to Know Your Customer Day’ reminds businesses, large and small, to take the time to better understand their customers –...

17th January 2019

Using ROSI to evaluate cybersecurity technologies

Being able to demonstrate ROI on security investments to the board is one of the tasks every CISO encounters. And it is not without its challenges. Intelligent CISO spoke to...

15th January 2019

Quest Software expert on the insider threat to the education sector

Cybercrime is a growing problem globally and the higher education sector is not immune to this threat, argues Colin Truran, Principal Technology Strategist, Quest Software. As today’s modern campus relies...

17th December 2018

Using the MITRE ATT&CK framework for threat hunting success

Threat hunting is a critical discipline. But how do you do it methodically and consistently to drive success? Here, Tim Bandos, VP of Cyber Security, Digital Guardian, introduces threat hunting...

10th December 2018

CyberArk expert – ‘Protecting CNI starts with securing social media’

Hacks to our CNI the facilities, information, networks and processes the country requires to function on a daily basis – or human error in relation to critical systems have become a...

6th December 2018

Expert view: The inevitable convergence of physical and cybersecurity

It may not be immediately clear as to how, but physical and cybersecurity are converging and the need for a combination of cyber and physical defences will soon, if they...

Browse our latest issue

Magazine Cover

View Magazine Archive