Software Defined Operations refer to a new way of managing your cloud policies and automatically applying preset guardrails. Read more to learn how you can use it to reduce your cloud costs and increa
Blog
-
5 Powerful Botnets Found Exploiting Unpatched GPON Router Flaw Within just 10 days of the disclosure of two critical vulnerabilities in GPON router at least 5 botnet families have been found exploiting the flaws to build an army of million devices.
17th May, 2018 -
Gandcrab Ransomware Exploits Website Vulnerabilities Gandcrab, among the newest threats in the ransomware space, started as a simple attack and quickly evolved as its authors adapted to security defenses. In the first two months of 2018, attackers infec
17th May, 2018 -
New Rowhammer Attack Can Hijack Computers Remotely Over the Network Dubbed ‘Throwhammer,’ the newly discovered technique could allow attackers to launch Rowhammer attack on the targeted systems just by sending specially crafted packets to the vulnerable network cards
17th May, 2018 -
Microsoft Launches Its Own Content Delivery Network ‘Azure CDN’ Microsoft just launched the public preview of its own global CDN network, which is now available through ‘Azure CDN’. Azure customers will be able to use and deliver content from Microsoft’s own globa
11th May, 2018 -
Breach Activity Declines, Number of Compromised Records Remains High After year over year increases in the number of reported data breaches, Risk Based Security has released the results of their Q1 2018 Data Breach QuickView Report, showing the number of breaches discl
11th May, 2018 -
Half of All Companies Do Not Have Adequate Application Security Visibility The Ponemon Institute surveyed nearly 1,400 IT and IT security practitioners in the United States, European Union and Asia-Pacific to understand the risk unprotected applications pose to businesses wh
11th May, 2018 -
First-Ever Ransomware Found Using Using ‘Process Doppelgänging’ Attack to Evade Detection Security researchers have spotted the first-ever ransomware exploiting Process Doppelgänging, a new fileless code injection technique that could help malware evade detection.
11th May, 2018 -
GDPR Requirements Prompt New Approach to Protecting Data in Motion GDPR will take effect on May 25, a response to data breaches and demands for greater oversight relating to security of personal identifiable information (PII).
7th May, 2018 -
Google Announces the Open-Source Asylo Framework for Confidential Computing Google announced the release of an open-source framework and an SDK dubbed ‘Asylo’ that allows developers to build applications targeting trusted execution environments.
7th May, 2018 -
Crypto Flaw in Oracle Acess Manager Allows Attackers to Pass Through A padding oracle vulnerability in Oracle Access Manager (CVE-2018-2879) can be exploited by attackers to bypass authentication and impersonate any user account.
7th May, 2018 -
8 New Spectre-Class Vulnerabilities Found in Intel CPUs A team of security researchers has reportedly discovered a total of eight new "Spectre-class" vulnerabilities in Intel CPUs, which also affect at least a small number of ARM processors and may impact
7th May, 2018 -
Less Than 10% of Organizations Are Ready for Multi-Cloud IDC has revealed that only 10% of European businesses are ready to implement multi-cloud infrastructure, with the majority of businesses sticking to one cloud vendor.
4th May, 2018