Clearly smart – Opaque Systems drives confidential computing
Opaque Systems is clear about one thing, its technology base requires some clarification and explanation. The firm is a specialist in secure multi-party analytics and AI for what it calls ‘confidential computing’, so what does that mean?
Taking each element in turn then, multi-party analytic... Read more
Visma and security: how does enterprise software become secure?
Visma puts a lot of emphasis on providing secure cloud software for accounting, procurement, invoicing, school administration, HRM and financial management. It made us curious what a software vendor actually has to do to keep things secure. What programs and initiatives are out there?
On a globa... Read more
Google Cloud protects customers from rogue Cobalt Strike attacks
Google Cloud announced new functionality for detecting Cobalt Strike-based cyberattacks.
Although Cobalt Strike was designed as a legitimate pentesting tool, the software's often abused by cybercriminals to penetrate networks. Cobalt Strike's pre-configured tools are particularly popular for rem... Read more
Fraudsters use 42,000 fake websites to push adware and ads
Fraud group 'Fangxiao' built a network of 42,000 sites that impersonate well-known businesses.
The network was designed to steer victims to websites pushing adware. Fangxiao uses fake domains to generate website traffic and advertising revenue for its own websites and the websites of customers w... Read more
Qualys TotalCloud, Totaalvoetbal to unify the cloud-native team
Think back for a moment, remember when cloud first happened?
Keep your company’s data and applications (and all manner of digital services) off-site, away from the organisation’s home premises and in some Cloud Services Provider (CSP) datacentre, located at goodness knows where right?
The... Read more
LinkedIn launches security features to remove fake profiles
LinkedIn has introduced new security features to curb the threat of malicious actors on its platform.
LinkedIn is the largest social media platform for businesses. There's been a rise in fake profiles and threat actors as of late. Due to its nature, malicious actors can get through the platform ... Read more
Typosquatting campaign impersonates 27 brands
27 brands from different sectors are being impersonated in a typosquatting campaign to trick unsuspecting users and install malware in their systems.
Typosquatting is as old as the internet. The technique involves a malicious actor creating a fake website with a domain name similar to a legitima... Read more
Canonical introduces DevOps security tool Ubuntu Pro
Canonical recently released a public beta of Ubuntu Pro. The tool should offer more comprehensive security than the standard version of the enterprise Linux distribution. The public beta is free for small-scale deployments.
With the introduction of Ubuntu Pro, Canonical wants to offer businesse... Read more
German security authority certifies the security of iPhones and iPads
The German Federal Office for Information Security (BSI) investigated the overall security of iOS and iPadOS smartphones and tablets. The analysis confirmed the efficacy of Apple's integrated security functions.
The BSI concluded that the applications for e-mail, calendar and contacts incorporat... Read more
Google Chrome’s new extension platform is expected in 2023
Google provided an update on the development of Manifest V3, the first-next version of the platform that powers extensions on Google Chrome. If everything goes according to plan, users and developers will be transitioned to Manifest V3 in January 2023.
"Years in the making, Manifest V3 is more ... Read more