
Internet Security Report – Quarter 3, 2021
Cybersecurity is all about staying one step ahead of your adversaries, managing and mitigating risk before threat actors can execute their attack. However, knowing what step to take next is
Cybersecurity is all about staying one step ahead of your adversaries, managing and mitigating risk before threat actors can execute their attack. However, knowing what step to take next is
Forecasting, or put another way, predicting the future, is hard! Few know this better than meteorologists. Among the general public, weathermen and women have an unfair reputation of missing their
After a very difficult 2020, filled with the pandemic, global political strife and regional societal conflicts, everyone was looking for a fresh start in 2021. Not only did last year’s
The report reveals and ranks the most common domains attackers use to host malware and launch phishing attacks – including several subdomains of legitimate sites and Content Delivery Networks (CDNs).
New research from WatchGuard Technologies shows that amid significant increases in both malware and network attacks, multiple Apache Struts vulnerabilities – including one used in the devastating Equifax data breach – appeared for the first time on WatchGuard’s list of most popular network attacks in Q3 2019.
Phishing is the number one cause for data breaches and XSurfLog has protection using Machine Learning (AI) to defend against this.
An average of 27% of people click on dangerous phishing links and XSurflog tracks browser activity to provide insight, detection and protection.
Browsing the internet can be dangerous and it only takes one link to compromise an account or computer.
Welcome to the first issue of the State of the Internet / Security report of 2019! We are
already a few weeks into the new year, and the holidays are now a memory. While the
first day of the year is just an arbitrary marker in time, it’s a good point of demarcation
to look back on the past and plan for the future.
The draft Code of Practice represents the Australian Government’s best practice guidance to secure consumer Internet of Things (IoT) devices.
Zero Trust Internet is a default deny approach that is fundamentally different from the way cybersecurity products work.
CONNECT WITH US
© My Security Media. All Right Reserved 2019.