Device Hardening Blog
Read the latest news, developments and opinion pieces on device hardening from industry experts New Net Technologies.
Microsoft issued an emergency fix for the recently discovered Meltdown vulnerability found in Intel CPUs, but warn that it may cause compatibility problems with some AV tools.
Details emerged this week on two major processor security flaws, leaving firms scrambling to issue fixes and secure machines for customers.
An unprotected MongoDB database containing the personal details on every voter in the state of California has been stolen and held for ransom after being exposed to the public facing internet.
Three men pleaded guilty yesterday to creating the infamous Mirai botnet, which is responsible for knocking offline some of the world’s most popular websites late last year.
Organizations during the third quarter experienced on average 237 DDoS attack attempts each month, equivalent to eight DDoS attack attempts each day.
Equifax, the credit agency guilty of poorly handling the private financial data of over 143 million consumers, has seen a 27 percent decrease in profits following the September hack.
A bipartisan legislation has been introduced that’s designed to protect the US voting systems infrastructure from foreign interference.
Two websites used to present the Czech Republic’s parliamentary election results were knocked offline after a DDoS attack last Saturday afternoon.
A massive new botnet has been found to be infecting poorly secured Internet of Things (IoT) devices, including IP wireless cameras.
As tools for conducting cyber attacks proliferate worldwide, large-scale cyber-attacks are becoming increasingly commonplace across the globe. But studies show that many organizations are still struggling to comprehend and manage the evolving cyber threats in our increasingly complex digital world.
Change Tracker Gen 7R2: Complete configuration and system integrity assurance combined with the most comprehensive and intelligent change control solution available.
Vulnerability Tracker: The world’s only limitless and unrestricted vulnerability scanning solution with unparalleled accuracy and efficiency, protecting your IT assets on premises, in the cloud and mobile endpoints.