Longhorn: Tools used by cyber espionage group linked to Vault 7; First evidence linking Vault 7 tools to known cyber attacks. Spying tools and operational...
The Cyber Range Lab to simulate real-world cyber-attacks and incidents and cyber-defence tactics. The Cyber Range Lab will provide technical training to enhance skill sets...
APT10 has targeted or compromised manufacturing companies in India, Japan and Northern Europe; a mining company in South America; and multiple IT service providers worldwide....
Made available as F-Secure XFENCE, Little Flocker’s technology will enhance F-Secure’s corporate and consumer macOS security solutions by adding advanced behavioral malware blocking. Cyber security...
New SD-WAN Functionality Combined with Security Fabric Features Enable Distributed Enterprises to Increase Flexibility with Reduced Cost and Complexity Fortinet announced the latest expansion of...
New CloudLens Public, World’s First Software-as-a-Service, Network-Level, Cloud-Native Visibility Solution Ixia announced it has further extended the reach delivered by the CloudLens Platform to the...
On average two-in-five computers, related to the technological infrastructure of industrial enterprises, faced cyber attacks in the second half of 2016. This is a finding...
Radware unveils Global Application and Network Security Report 2016-17 Radware unveiled the Global Application and Network Security Report 2016-17. Speaking about the report, Nikhil Taneja,...