Find

June 17, 2021

Keeping the game on during Euro 2020

The most obvious motivation is financial gain, using the threat of a DDoS attack to hold them to ransom. Other potential motivations could include attacks on behalf of competitors, threat actors looking to use a DDoS attack as a diversion. The good news is that there are several ways to shore up your defenses. Increasingly, this involves stopping attacks from reaching the enterprise network by leveraging cloud-based managed services.
by | 5 min read
June 16, 2021

Five digitalisation trends transforming the finance function

At the heart of this digital transformation for finance and accounting teams is the potential for information technology and open data standards to reduce lags and latencies in the operations and processes. Based on these expectations, finance and accounting teams are focused on ensuring that their own function is equipped with the tools, technologies and talent for this digital transformation.
by | 3 min read
June 14, 2021

Four security vulnerabilities were found in Microsoft Office by CPR

CPR discovered vulnerable functions inside MSGraph. Similar code checks confirmed that the vulnerable function was commonly used across multiple different Microsoft Office products, such as Excel, Office Online Server and Excel for OSX.
by | 2 min read
June 13, 2021

BackdoorDiplomacy attacks diplomats in Africa and the Middle East

BackdoorDiplomacy shares tactics, techniques, and procedures with other Asia-based groups. Turian likely represents a next stage evolution of Quarian, the backdoor last observed in use in 2013 against diplomatic targets in Syria and the United States.
by | 2 min read
June 9, 2021

An Edge Computing Breakup: Out with the Old, and In with the New

Edge computing is defined loosely as a model that brings computational, data storage and connectivity resources closer to the locations where they’re needed, saving bandwidth and accelerating response times. Edge technologies power millions of IoT applications in industrial, retail, healthcare and smart cities environments, and, prior to 2020, analysts expected an additional bump from virtual reality and 5G in the coming years.
by | 4 min read
June 8, 2021

The top 5 SMB vulnerabilities

Cyber protection brands like Acronis are always monitoring for dangers to your data, deploying updates to handle newly-discovered vulnerabilities, and issuing alerts and recommendations to help you stay protected. Our global network of Acronis Cyber Protection Operations Centers (CPOCs) continues to work around the clock to proactively detect and defend against the latest cyber threats.
by | 3 min read
June 8, 2021

Siloscape: First Known Malware Targeting Windows Containers

Siloscape is heavily obfuscated malware targeting Kubernetes clusters through Windows containers. Its main purpose is to open a backdoor into poorly configured Kubernetes clusters in order to run malicious containers.
by | 10 min read
June 8, 2021

Top 10 security Misperceptions

9 Commonly held misperceptions:1.we are not target as we are small/no asset.2. we do not need advanced technologies installed everywhere.3. we have robust security4. RDP servers can be protected by implementing MFA5. blocking IP from high risk regions6. our backups provide immunity7. our employees understand security8. data can be recovered even after ransomware attack9. paying ransomware to recover data
by | 4 min read
May 27, 2021

BEACON RED teams up with Quali to provide cyber solutions in GCC Region

Under the terms of the agreement, BEACON RED and Quali will deliver a joint solution that enables customers to establish complex cyber range and interoperability testing scenarios for their clients in the GCC region.
by | 2 min read
May 25, 2021

Cybersecurity & Business Continuity

Cybersecurity and business continuity are still mainly separated silos, but due to the cyber super highway's widespread exposure, there is a pressing need for firms to change their approaches in order to build business resilience.
by | 5 min read