Find

August 29, 2022

Kaspersky, Microsoft partner to deliver threat intelligence to Microsoft Sentinel users

Kaspersky Threat Data Feeds have been integrated with Microsoft Sentinel, a cloud native SIEM and SOAR solution, to provide actionable context for attack investigation and response. With this integration, enterprise security teams can improve the effectiveness of initial alert triage, threat hunting, and incident response by extending cyberthreat detection capabilities.
by News Desk | 2 min read
August 26, 2022

Ransomware damages to exceed $30 billion by 2023

Acronis, a global provider of cyber security, has released its mid-year cyberthreats report, which was conducted by Acronis' Cyber Protection Operation Centers to provide an in-depth review of the cyber threat trends being tracked by the company's experts.
by News Desk | 3 min read
August 25, 2022

Research reveals top 5 industries targeted by ransomware

Barracuda researchers discovered that the education (15%), municipality (12%), healthcare (12%), infrastructure (8%), and financial (6%) sectors are the five most targeted by adversaries after identifying and analyzing 106 highly publicized ransomware attacks over the past year. According to the analysis, ransomware attacks on educational institutions more than doubled from the previous year
by News Desk | 2 min read
August 25, 2022

ECS joins InfoComm India to showcase latest LIVA family

Elitegroup Computer Systems (ECS), a global motherboard, mini PC, notebook, mobile device, and smart solution provider, has announced its participation in InfoComm India 2022, which will take place from September 5th to 7th at the Bombay Exhibition Center in Mumbai, Booth No. G24. ECS will showcase its newest LIVA Mini PC series and All-in-One PC.
by News Desk | 2 min read
August 25, 2022

Rise in Microsoft Office vulnerabilities in the Middle East

In Q2 2022 the number of exploits for vulnerabilities in the Microsoft Office suite increased globally compared to Q1 – accounting for 82% of the total number of exploits across different platforms, according to the latest Kaspersky quarterly malware report.
by News Desk | 2 min read
August 24, 2022

BeyondTrust releases new intelligent identity and access security platform

BeyondTrust, a provider of intelligent identity and access security, has released the BeyondTrust Platform, which features a modern architecture that provides unprecedented visibility of identities and access across an organization's entire digital estate, from on-premises to cloud, hybrid, and operational technology environments.
by News Desk | 2 min read
August 23, 2022

AI and ML reliability and security: BlenderBot and other cases

Blenderbot, an AI-driven research project by Meta, has been making headlines since its debut in early August 2022. Blenderbot is a conversational bot, and its statements about people, businesses, and politics appear unexpected and sometimes radical.
by News Desk | 2 min read
August 19, 2022

Microbyte shares three crucial security tips for Middle East businesses

Microbyte, an ICT security service provider, has urged Middle Eastern businesses to increase their efforts and be extra vigilant of the threats posed by cyberattacks, emphasizing the importance of investing in a strong infrastructure system for day-to-day operations.
by News Desk | 2 min read
August 12, 2022

Criminals switch from macros to shortcut files to access business PCs

A wave of cybercriminals propagating malware families, including QakBot, IceID, Emotet, and RedLine Stealer, are switching to shortcut (LNK) files to deliver malware, according to HP Inc.'s quarterly Threat Insights Report.
by News Desk | 3 min read
August 11, 2022

Cybereason’s MDR Mobile App puts SOC power at the fingertips of Defenders

Cybereason, the XDR company, has released the Cybereason Managed Detection and Response (MDR) Mobile App, which gives Defenders the power of a security operations center (SOC) at their fingertips. Defenders can further reduce the mean-time-to-remediation with the Cybereason MDR Mobile App by suspending an attack's lateral movement directly from their mobile device.
by News Desk | 2 min read