Cybersecurity

Think like a hacker to protect your organization from security breaches – Key takeaways from Nuix Black Market Report 2018

Second annual report in the row, Nuix Black Report 2018 is a unique work on cybersecurity landscape. It gets into the hackers’ minds and the insights it draws can help enterprises anticipate, detect a...

Abandoned domain names can cause serious cyberthreats to previous owners

An abandoned domain name can allow cybercriminals to gain access to email addresses of the company that previously owned it, finds cybersecurity expert Gabor Szathmari. When a domain name gets expired...

Vulnerability in outdated theme and plugin takes WordPress site visitors to unwanted websites

Researchers at Sucuri have discovered a new WordPress redirect campaign that takes the website visitors to sites that they wouldn’t like to visit. The attackers have infected the websites through tagD...

400 million unique malware samples detected globally in Q2 2018: Comodo Global Threat Report

In the second quarter of 2018, the leading cybersecurity firm Comodo detected more than 400 million unique malwares in the top-level domains of 237 countries. In its Global Threat Report, the cybersec...

Comodo Zero-day Challenge seeks to unmask anti-virus vendors that fool customers

The leading cybersecurity provider Comodo has rolled out a new challenge for anti-virus (AV) industry that highlights the lack of quality in current AV practices. Called the Comodo Zero-day Challenge,...

WordPress 4.9.7 fixes critical media vulnerability in 4.9.6 and earlier versions

WordPress has fixed a very critical vulnerability existing in the versions 4.9.6 and earlier. The latest WordPress 4.9.7 has been released with more security and maintenance improvements. According to...

Top 6 emerging cybersecurity and risk management trends: Gartner

One of the main security objective of all the organizations is to protect information confidentiality. The organizations must consider IT security and IT risk management as a part of the executive bus...

ZNetLive rolls out Acronis Backup Cloud to provide businesses with constant data availability in changing threat landscape

ZNetLive, India’s leading web hosting and cloud services provider, today announced an expansion of its product portfolio to include Acronis Backup Cloud. The new service delivers reliable hybrid cloud...

HPE to invest $4 billion in intelligent edge technologies over the next four years

Hewlett Packard Enterprise (HPE) is planning to invest $4 billion into intelligent edge technologies and services over the next four years. Antonio Neri, CEO of HPE, announced the company’s plan at Di...

Biggest cloud security challenges in 2018 and their solutions

As more organizations adopt cloud to leverage advantages like better scalability, more efficiency, and faster deployments, the cybersecurity pros remain concerned about security of data, systems and s...

Recap Rootconf 2018 – a look at the current and future security trends of IT infrastructure and DevOps

HasGeek hosted 400+ developers, architects, managers and security experts at Rootconf 2018, which concluded on 10-11 May 2018. The two-day conference, held at NIMHANS Convention Centre, had over 35 se...

SSAE16 vs. SSAE18: What’s The Difference?

There’s a new SOC audit standard in town – and you need to know what it is and means if you’re to make an informed decision about your hosting company. For years, SSAE16 has been the go-to stand...

Skip to toolbar