Device Hardening Blog
Read the latest news, developments and opinion pieces on device hardening from industry experts New Net Technologies.
The Bristol Airport in the UK suffered widespread outages for past two days after being hit by a ransomware attack on Friday.
Equifax announced yesterday it has agreed to a set of data security rules imposed by a new consent order with eight state financial regulators, the latest response following the data breach that impacted over 147 million consumers.
Details belonging to users of the Israeli genealogy and DNA testing service MyHeritage were found on an internet file containing the email addresses and hashed passwords of more than 92 million of its users.
A recent report found that cybercriminals have been utilizing the infamous Mirai malware as a framework on which to build enhanced IoT malware with more advanced capabilities since it first appeared in late 2016.
The UK Government has released a draft code of practice designed to help manufacturers and end users better safeguard their Internet of Things (IoT) devices.
Security experts are warning that an IoT botnet is targeting financial firms with DDoS attacks, in what many believe is the first of its kind since the notorious Mirai campaign.
Recorded Future has released its 2017 findings for the top 10 vulnerabilities exploited by cybercriminals, an analysis conducted due to a continued weakness in traditional vulnerability databases and scanning tools- they do not indicate which vulnerabilities are currently being exploited.
Last Wednesday, GitHub was hit by the largest DDoS attack ever recorded, measuring 1.3 Tbps of sustained traffic for eight minutes.
Over 30 lawsuits have been filed by Intel customers and shareholders following the disclosure of the Meltdown and Spectre attack methods.
New documents provided recently by Equifax to US senators revealed that the breach the company experienced last year may have involved types of data not mentioned in the initial disclosure of the incident.
Change Tracker Gen 7R2: Complete configuration and system integrity assurance combined with the most comprehensive and intelligent change control solution available.
Vulnerability Tracker: The world’s only limitless and unrestricted vulnerability scanning solution with unparalleled accuracy and efficiency, protecting your IT assets on premises, in the cloud and mobile endpoints.