Guest written by: John Hathaway, Regional Sales Director, Middle East, BeyondTrust Privileged password management, sometimes called enterprise password management, refers to the practice and technique of securely controlling credentials for privileged accounts, services, systems, applications, and more. But unfortunately, with so much power inherent in privileged credentials, they are ripeRead More…

FireEye has recently uncovered the spread of a campaign attributed with moderate confidence to APT28, actively targeting the hospitality sector. The company uncovered a malicious document that was used to target multiple companies in the hospitality industry including hotels in at least seven European countries and one Middle Eastern country. APT28 isRead More…

Lookout researchers have identified over a thousand spyware apps related to a threat actor likely based in Iraq. Belonging to the family “SonicSpy,” these samples have been aggressively deployed since February 2017, with several making their way onto the Google Play Store. Google removed at least one of the appsRead More…

Guest written by Rick Holland, VP Strategy at Digital Shadows The law enforcement operations that took down the AlphaBay and Hansa marketplaces were meant to strike a sizable blow to the online trade of illegal goods and services. Frequenters of these services might now think twice before placing their trust in these unregulated platforms, andRead More…

Neustar, a neutral provider of real-time information services, today announced that it has expanded its international partner network across Europe and the Middle East. The appointment of five new value-added distributor (VAD) partners to its Cloud Security Partner Programme will enable Neustar to address the increased and continuously growing demand for securityRead More…