Subscribe to Email Updates

Subscribe

All about Virtualization and Cloud Security | Recent Articles:

Advanced Attack Groups Increasingly Threaten North American Electric Utilities

Feb 14 by George V. Hulme

When it comes to critical infrastructure, there are few more essential than electricity generation and distribution. Without electricity, nothing else works. According to a report from cybersecurity firm Dragos, groups have shown that they have the capability to impact power operations and network connectivity detrimentally. "Electric utilities remain at risk for a disruptive – and potentially destructive – cyberattack due to the political and economic impact such an event may cause,” the firm wrote in its report North American Electric Cyber Threat Perspective.

Read More

U.S. Healthcare System Attacked at Least 172 Times with Ransomware Since 2016

Feb 13 by Silviu Stahie

The healthcare industry is fighting a wave of ransomware attacks, as hackers constantly adapt a varied arsenal of malware tools. A recent survey found 172 cyberattacks against the healthcare systems have succeeded in the past four years.

Read More

Hackers Actively Targeting U.S. Supply Chain Companies, FBI Warns

Feb 12 by Filip Truta

The Federal Bureau of Investigation has issued a private industry notification warning organizations across the U.S. that hackers are actively targeting their supply chain partners to compromise their systems.

Read More

Explore the boundaries of the human element with Bitdefender at RSA 2020

One year back, Bitdefender was featured in Dark Reading’s series Cybersecurity and the Human Element: We're All Fallible. At that time, we provided our perspective on the fallibility for end users, security leaders, security analysts, IT security administrators, programmers, and attackers. Fast forward to today, RSAC 2020 Trend Report singles out the human element as the main trend in cybersecurity in 2020, and themes RSAC 2020 event around it:

Read More

Majority of Developers are Concerned over the state of Their Application Security

Feb 11 by George V. Hulme

While software developers are showing signs of high apprehension when it comes to the security of their software, their organizations however have considerable work ahead of them getting developers the tools they need to succeed.

Read More

Hypervisor Introspection Thwarts Web Memory Corruption Attack in the Wild

Feb 10 by Michael Rosen
  • New remote memory corruption vulnerability in Internet Explorer browsers allows for full takeover of infected systems
  • Bitdefender has confirmed exploitation in the wild of CVE-2020-0674 with analysis of 2 distinct executable payloads
  • Hypervisor Introspection delivers true zero-day protection by preventing all common memory exploit techniques
Read More

Cyber Security Skills Gap is Becoming More of a Chasm

Feb 10 by Bob Violino

Every cyber security executive knows—or should know—that the current demand for skills is much greater than the supply. But a recent study by (ISC)², an international non-profit membership association of certified cyber security professionals, indicates just how mammoth the talent shortage has become.

Read More

Gaming Became Industry Most Affected by DDoS Attacks in 2019

Feb 07 by Silviu Stahie

Any organization with an online footprint is always exposed to DDoS (distributed denial-of-service) attacks, and new data from Imperva shows no industry has more to fear than Games and Gambling.

Read More

The 'Grass-is-Greener' Syndrome of Modern SOCs

Feb 06 by Ericka Chickowski

While most enterprises recognize the critical role that security operation centers (SOC) play in cybersecurity activities, very few are able to perfect a SOC approach that meets their ultimate satisfaction. A new study out on attitudes toward SOC efficacy shows that organizations are spending millions each year to run their SOCs, but that many are unhappy with the ROI from this investment.

Read More

How Does a Business Become a Champion in Cyber Resilience?

Feb 05 by Filip Truta

Cyber threats lurk behind every corner, in every industry and geography. From run-off-the-mill crooks to sophisticated state-sponsored actors, cybercriminals take every opportunity to exploit weaknesses for quick cash, to exfiltrate data, or to simply disrupt operations, depending on their goal.

Read More

The Protocol That's Putting Enterprise IoT At Extreme Risk

Feb 04 by Ericka Chickowski

A protocol little known by executives outside of the networking world may put the future safety of enterprise IoT at extreme risk if organizations don't take action to secure their connections. New research out last week found that the way that many large organizations are using the Long Range Wide Area Networking (LoRaWAN) protocol is making them susceptible to hacking that could cause civic disruption and even put people at risk.

Read More

How to Mitigate the Most Common Cloud Vulnerabilities

Feb 03 by Filip Truta

The US National Security Agency (NSA) has published an important document outlining the main classes of cloud vulnerabilities and the ways an organization can go about addressing them.

Read More

Cloud Security




Subscribe to Blog Updates

Latest Tweets