Tag: network security
‘We came into this space looking to disrupt the space and to change the status quo,’ says Juan Fernandez, SuperOps’ global channel chief. ‘Their approach to the market and how they’re going to market is very similar to the way we are. A lot of other distribution points were not looking for a similar type…
Read MoreJun 10, 2024NewsroomPhishing Attack / Cybercrime Cybersecurity researchers have spotted a phishing attack distributing the More_eggs malware by masquerading it as a resume, a technique originally detected more than two years ago. The attack, which was unsuccessful, targeted an unnamed company in the industrial services industry in May 2024, Canadian cybersecurity firm eSentire disclosed last…
Read MoreCisco Go-To-Market President Gary Steele On Splunk-Cisco Integration, This Week’s .Conf24 Event, And Building AI Into Observability
- by nlqip
Gary Steele, who serves as Splunk general manager in addition to his Cisco post, says in an interview with CRN that a major focus for him is not allowing the nitty-gritty of the ongoing Cisco-Splunk integration to disrupt Splunk’s track record of innovation. In mid-March Cisco Systems completed its $28 billion acquisition of Splunk in…
Read MoreTerms of the acquisition deal for Lacework, which had once been valued at $8.3 billion, weren’t disclosed. Fortinet announced Monday it has reached an agreement to acquire cloud security firm Lacework in a significant consolidation deal for the cybersecurity industry. The terms of the deal, which is expected to be completed in the second half…
Read MoreGoogle has revealed that it took down 1,320 YouTube channels and 1,177 Blogger blogs as part of a coordinated influence operation connected to the People’s Republic of China (PRC). “The coordinated inauthentic network uploaded content in Chinese and English about China and U.S. foreign affairs,” Google Threat Analysis Group (TAG) researcher Billy Leonard said in…
Read MoreJun 10, 2024NewsroomCloud Security / Vulnerability Microsoft is warning about the potential abuse of Azure Service Tags by malicious actors to forge requests from a trusted service and get around firewall rules, thereby allowing them to gain unauthorized access to cloud resources. “This case does highlight an inherent risk in using service tags as a…
Read MoreStaying Sharp: Cybersecurity CPEs Explained Perhaps even more so than in other professional domains, cybersecurity professionals constantly face new threats. To ensure you stay on top of your game, many certification programs require earning Continuing Professional Education (CPE) credits. CPEs are essentially units of measurement used to quantify the time and effort professionals spend on…
Read MoreWhat is Operational Technology? Operational Technology (OT) is the backbone of our modern world as we know it today. Think about the daily operations of a factory, the precise control of our power grids, and even the supply of clean water to our homes. All of these modern capabilities are made possible and efficient due…
Read MoreJun 10, 2024NewsroomCyber Espionage / Malware Cybersecurity researchers have disclosed details of a threat actor known as Sticky Werewolf that has been linked to cyber attacks targeting entities in Russia and Belarus. The phishing attacks were aimed at a pharmaceutical company, a Russian research institute dealing with microbiology and vaccine development, and the aviation sector,…
Read MoreJun 08, 2024NewsroomVulnerability / Programming Details have emerged about a new critical security flaw impacting PHP that could be exploited to achieve remote code execution under certain circumstances. The vulnerability, tracked as CVE-2024-4577, has been described as a CGI argument injection vulnerability affecting all versions of PHP installed on the Windows operating system. According to…
Read MoreRecent Posts
- Nutanix Grows New Customers As Channel Engagement Increases, CEO Says
- Tenable Selected by Tohoku University to Secure External-Facing Assets Amidst Migration to the Cloud
- New NachoVPN attack uses rogue VPN servers to install malicious updates
- Jen Caltrider Unwraps this Season’s Hidden Privacy Nightmare
- NordVPN Black Friday Deal: Save up to 74% on yearly subscriptions