Zephyrnet Logo

Cyber Security

Dark Nexus, a new IoT botnet that targets a broad range of devices

Cybersecurity researchers discovered a new IoT botnet, tracked as Dark Nexux, that is used to launch distributed denial-of-service (DDoS) attacks. Dark Nexux is...

WhatsApp new policy limits forwarding of viral messages

WhatsApp implements limitations on message forwarding to curb the spread of misinformation about the Coronavirus pandemic. WhatsApp implements a new policy on message...

You’re (probably) Doing AppSec Wrong – Grant Ongers – ASW #102

Most security programs generally get in the way of delivery (if they don’t, to all intents and purposes, prevent it altogether) and...

Collaboration Between NetOps and SecOps in Today’s World – Matt Allen – PSW #645

Matt and the Security Weekly crew will discuss how the interaction between network engineers and security operations has changed over the years,...

Two schoolkids sue Google for collecting biometrics

by Lisa Vaas Two schoolchildren have sued Google, alleging that it’s illegally collecting their voiceprints, faceprints and other personally...

80% of Exchange Servers Still Unpatched to Critical Remote Code Execution Vulnerability

Microsoft recently patched a remote code execution vulnerability with Microsoft Exchange Server that allows an attacker to use an Exchange user account...

Accellion Secures $120 Million In Financing Led By Bregal Sagemount To Accelerate Adoption Of The Enterprise Content Firewall

Company Delivers Consolidated Solution to Secure 3rd Party Communications Across Email, File Sharing, Enterprise Apps, Web Forms, SFTP, MFT, and MobilePalo Alto,...

Email provider got hacked, data of 600,000 users now sold on the dark web

The data of more than 600,000 Email.it users is currently being sold on the dark web, ZDNet has learned following a tip from...

Qualys VMDR: Discover, prioritize, and patch critical vulnerabilities in real time

In this podcast, Prateek Bhajanka, VP of Product Management, Vulnerability Management, Detection and Response at Qualys, discusses how you can significantly accelerate an...

Download: CISO Checklist for Secure Remote Working

The recent mass transition to working remotely coupled with cyberattacks introduces a heavy burden on the CISO. The CISO Checklist for Secure Remote...

FBI Warns of BEC Dangers

A new PSA warns of attacks launched against users of two popular cloud-based email systems.If your organization uses a popular cloud-based email system,...

TLS 1.3: Slow adoption of stronger web encryption is empowering the bad guys

For twelve years, the standard internet encryption has been Transport Layer Security (TLS) 1.2. Following its roots takes you back to the first...

Latest Intelligence

spot_img
spot_img