Proofpoint advances threat management with ObserveIT acquisition
Proofpoint has announced it’s acquired ObserveIT, the insider threat management platform, for $225 million in cash. The agreement will officially close later this year subject to conditions including Hart-Scott-Rodino merger review.
The acquisition is seen by Proofpoint as an investment into f... Read more
‘Companies want to replace VPN with Zero Trust Network Access’
There are several possibilities on the market to make remote working possible. One of these is the virtual private network, or VPN. This solution is now widely used, but now also comes with risks. Companies want to get rid of VPNs, according to research by Zscaler.
Companies increasingly prefer ... Read more
BlueKeep vulnerability in Windows is getting abused
Security researchers have spotted attacks utilising BlueKeep. BlueKeep is a vulnerability in older versions of Microsoft's Remote Desktop Protocol (RDP). The error was discovered in the May 2019 Patch.
However, the biggest fear people had regarding BlueKeep does not seem to have come true for th... Read more
Expert talks
Ignore DNS at your peril
Businesses have to pay close attention to their web traffic, especially when migrating business applications to the cloud. Obviously, web traffic is vital to any organization. And, the perception of internal and external users regarding the security and performance of business applications or e-com... Read more
New TLS protocol advances web security
Facebook, Cloudflare and the Mozilla Foundation have been collaborating to advance Transport Layer Security (TLS).
Strengthening web security
Individually, the companies released updates regarding security protocol Delegated Credentials. The new TLS protocol aims to strengthen web security an... Read more
Office 365 phishing campaign uses fake voicemails
Cybercriminals are constantly finding new ways to steal data
from victims. For example, a new phishing campaign uses fake voicemail
messages to convince targets to surrender their Office 365 credentials.
The campaign was discovered by McAfee security researchers, reports SiliconAngle.
The cam... Read more
‘Cybersecurity AI algorithms should become publicly available’
Algorithms and methodologies for artificial intelligence
(AI) and machine learning are becoming increasingly important in cybersecurity.
However, more cooperation between the various stakeholders is needed in order
to unlock the full potential of these technologies. By placing them in a public
AI F... Read more
WhatsApp sues Israeli company for spying on users
In May this year, WhatsApp was found to contain a vulnerability that allowed users to be eavesdropped on. Spyware from the Israeli company NSO Group was used for this purpose. The chat app has now taken the NSO Group to court because of the practices.
The NSO Group's spyware was found to be inst... Read more
Bitdefender NTSA now also detects attacks using DNS services
Bitdefender's Network Traffic Security Analytics (NTSA) solution can now also recognize attacks that use DNS and FTP services. This is possible because of the fact that the NTSA solution now includes machine learning algorithms for this purpose.
Bitdefender NTSA
is a solution that allows compani... Read more
‘Chinese hackers most active worldwide’
CrowdStrike reports that hackers working for the Chinese government are the most active worldwide. The company's most recent OverWatch research report states that hackers from China are as active as hackers from Russia, Vietnam, Iran and North Korea combined.
According to CrowdStrike, the Chines... Read more