Zephyrnet Logo

Tag: Blog

Cyber Security Considerations for Protecting Remote Employee Devices and Remote Access Environments

With COVID-19 (Coronavirus) being declared a pandemic by the World Health Organization, many organizations have asked employees to work remotely and/or restrict...

Open source software use grows in Germany, but compliance and risk management need improvement

A new report from Bitkom reveals that among companies that use open source, many aren’t sure of the best way to approach...

The New Generation of Cybersecurity Solutions: from Features to Outcomes

Today, businesses face a new set of challenges:more aggressive cyber threats (higher exposure to risk)increased attack surfacedifficulty to find adequate security staffincreasing...

DEF CON 27 Monero Village – Allan Stevo’ ‘AirBNB For Retail Internet: A Distributed Internet Tech’

Thanks to Def Con 27 Volunteers, Videographers and Presenters for publishing their superlative conference videos via their YouTube Channel for all to...

Thousands of COVID-19 scam and malware sites are being created on a daily basis

In the midst of a global coronavirus (COVID-19) pandemic, hackers are not letting a disaster go to waste and have...

Nefilim Ransomware Threatens to Release Victims’ Data within a Week

A newly discovered ransomware family called “Nefilim” told its victims that it would publish their stolen data within a week unless they paid...

Vulnerabilities of Multi-Factor Authentication for Remote Working

With many contemplating remote work, securing credentials is vital. Knowing what vulnerabilities may exist in MFA could prevent serious threats. The post Vulnerabilities...

Semperis COVID-19 Update

Last Update March 18, 2020This post provides information about steps Semperis is taking in response to the COVID-19 crisis. These actions are...

Use an IP address from the United Arab Emirates on the ProtonVPN network

ProtonVPN users in the UAE can now browse the Internet with an Emirati IP address while encrypting their online activity. The UAE...

Free Ransomware Help for Coronavirus Healthcare Providers

As hospitals around the world struggle to respond to the COVID-19 crisis, ransomware presents a serious risk to their ability to provide...

4 strategies for balancing cybersecurity and business continuity planning during the coronavirus outbreak

IntroductionAs cybersecurity conferences worldwide cancel events, the impact of the coronavirus (COVID-19) on the industry comes close to home. At least two...

Malware spotlight: Ekans

IntroductionIndustrial Control Systems, or ICS, have been the target of malware for some time now. Most of these threats target Windows systems...

Latest Intelligence

spot_img
spot_img