Fireball malware: The next Mirai?
Guest written by Mohammed Al-Moneer, Regional Director, MENA at A10 Networks.Read More…
Guest written by Mohammed Al-Moneer, Regional Director, MENA at A10 Networks.Read More…
Security experts from Beyond Security, a leading provider of automated security testing solutions including vulnerability assessment, released 5 effective and easy tips to follow for protecting against serious Internet security threats that can cause both financial and emotional damages: 1. Use an up-to-date and supported operating system. All victims ofRead More…
When it comes to cybercrime, it’s easy to imagine that the biggest threat to a company is external. However, more and more companies are realizing that trusted and trained employees can also pose an enormous threat. Indeed, a recent report by Haystax Technology discovered that 74% of organizations questioned “feelRead More…
Digital Shadows, a leader in digital risk management, has unveiled research into some of the main techniques cybercriminals are using to target organizations using stolen credentials which have been reused across a variety of sites and online forums. The report also outlines what measures organizations can implement to protect againstRead More…
Guest written by Alain Penel, Regional Vice President – Middle East, Fortinet.Read More…
Guest written by Greg Day, VP & CSO, EMEA at Palo Alto Networks.Read More…
Author: Mohammad Tabbara, Senior Systems Engineer – UAE & Channel at Infoblox The Infoblox Intelligence Unit observed two global malware outbreaks on Friday, May 12. Although there is no indication that the two attacks were related, both were ransomware attacks with the goal of encrypting the victim’s files, demanding aRead More…
Guest written by: Digital Shadows Analyst Team On 12 May 2017, as the WannaCry ransomware spread across computer networks across the world, a variety of explanations also began to worm their way through the information security community. Who was responsible for the WannaCry campaign? And what was the objective? RansomwareRead More…
Copyright © 2025 - Zarks Media. All rights reserved