We have a mobile site!
Go to the mobile site >[x] Hide this

Malwarebytes for Home | Anti-Malware Premium | Free Trial Download
Cyber Security News – The Cyber Chronicle

Cyber Security News - We scrub the web for the best articles so you don't have to.

  • Home
  • Manufacturer News
  • Cyber Security News Archives
Hackers Promise ‘No More Healthcare Cyber Attacks’ During COVID-19 Crisis

Hackers Promise ‘No More Healthcare Cyber Attacks’ During COVID-19 Crisis

< Cyber Security News - The Cyber Chronicle home

Manufacturer News

OKTA

  • Okta to Present at Upcoming Investor Conferences
    SAN FRANCISCO --(BUSINESS WIRE)--Dec. 3, 2020-- Okta, Inc. (NASDAQ: OKTA), the leading independent provider of identity for the enterprise, today announced ...
  • Okta and Amazon Web Services Bring the Okta Identity Cloud to AWS Marketplace
    Further helps enterprises accelerate adoption of secure cloud infrastructure, broad identity solutions SAN FRANCISCO --(BUSINESS WIRE)--Dec. 2, 2020-- Okta ...
  • Okta Secures the Identities of Banks, Accelerating Digital Transformation in Financial Services
    Financial services organizations deploy a single platform, the Okta Identity Cloud, to secure their workforces and customers SAN FRANCISCO --(BUSINESS WIRE ...

Comodo

  • Comment on How to Protect Yourself from Printer/Scanner Malware by Jhoney perker
    After reading this article headline I am worrying that how to protect my scanner from the attack of malware, but the author describes all the protection to save my scanner.I am very helpful to the aut ...
  • Comment on Comodo protects five universities from new malware that steals data by Rocketmail Customer Service
    Comodo is one of the best antiviruses of nowadays as in present days it got an exceptionally great performance by protecting from the threat in many universities and private companies, Thanks for shar ...
  • Comment on Comodo 2017 Global Malware Report: Cyber Risks and Geopolitical Threats by Marco Smit
    The Comodo Blogs are very welcome. It give an inside in the malware threaths and countries and news is also welcome to improve your own security. ...

Wombat

  • Nothing to display ...

Symantec

  • Nothing to display ...

Manufacturer Blogs

  • Accenture
  • AlienVault
  • AT&T Network Security
  • BlackBerry
  • Carbon Black
  • Checkmarx
  • Cimcor
  • Code Dx
  • Continuum GRC
  • Corero
  • CyberArk
  • Dark Trace
  • Deloitte
  • F-Secure Safe & Savvy Blog
  • FireEye
  • Fortinet
  • Gemalto
  • Gigamon
  • Google Online Security Blog
  • Guidance Software
  • HackerOne
  • i-Sprint Innovations
  • IBM Security
  • Illumio
  • Imperva
  • Imprivata
  • Inspired eLearning
  • KPMG
  • Kroll
  • L-3
  • McAfee Blog
  • Microsoft Malware Protection Center
  • Mimecast
  • Netskope
  • Nexusguard
  • NNT
  • Northrop Grumman
  • OKTA
  • OneLogin
  • Palantir
  • Pindrop Security
  • Proofpoint
  • Pwnie Express
  • Qualys
  • Radware
  • Rapid 7
  • Raytheon Cyber
  • RSA
  • Sailpoint
  • SAS Institute
  • Secureworks
  • SnoopWall
  • SonicWall
  • Sophos
  • SpiderLabs Security Blog
  • Telos Corporation
  • Tenable Network Security
  • Threat Stack
  • Thycotic
  • Trend Micro
  • Veracode
  • Verizon Enterprise
  • VMware
  • We Live Security
  • Webroot
  • Wombat Security Blog
  • Ziften
  • Zone Alarm Cyber Security Blog

Fortinet

  • Fortinet Receives Awards for Continued Commitment to Channel Partners
    Fortinet is proud to have been the recipient of two awards from our channel partners, Ingram Micro Inc. and Tech Data. Learn more.
  • Education SaaS Provider Achieves Agile Cloud Migration with Fast, Flexible Fortinet Solutions in AWS
    Learn how one education SaaS provider leveraged Fortinet's cloud security solutions for AWS to achieve agile cloud migration.
  • What Are Hybrid Networks, and How Can We Secure Them?
    Learn how increasingly distributed organizations can ensure that their security can keep up with hybrid networks.

NetSkope

  • Applying 3 Practical Lessons from the SolarWinds Breach
    It’s been more than a month since the SolarWinds breach first started dominating security headlines, and we’re still learning new details about th ...
  • How Netskope Can Help with Your 10 Critical Security Projects – Nos. 9-10
    The annual list of top security projects from Gartner provides key insights on where security leaders should focus their limited time and resources to ...
  • You Can Run, But You Can’t Hide: Advanced Emotet Updates
    Co-authored by Ghanashyam Satpathy and Dagmawi Mulugeta Summary Emotet has become one of the world’s most advanced botnets. Like many malware campai ...

Demisto

  • Nothing to display ...

Sailpoint

  • SailPoint Achieves ServiceNow Built on Now Platform Status
  • SailPoint Honors Global Partners and Delivery Admirals at Revenue Kick-off 2021
  • State Governments Rely on SailPoint to Address Top Priorities

Manufacturer Two

  • A10 Networks
  • Arbor Networks
  • Avast
  • Bay Dynamics
  • CynergisTek
  • CYREN
  • HPE
  • Illusive Networks
  • Leidos
  • Level 3
  • Malwarebytes
  • MobileIron
  • PhishMe
  • PKWARE
  • SentryBay
  • SparkCognition
  • Tanium
  • Unisys
  • When it comes to cyberattacks, it is no longer a question of if they will occur, but when.
    When it comes to cyberattacks, it is no longer a question of if they will occur, but when.
  • Load more [+]

FireEye

  • Training Transformers for Cyber Security Tasks: A Case Study on Malicious URL Prediction
    Highlights        Perform a case study on using Transformer models to solve cyber security problems Train a Transformer model to detect ...
  • Emulation of Kernel Mode Rootkits With Speakeasy
    In August 2020, we released a blog post about how the Speakeasy emulation framework can be used to emulate user mode malware such as shellcode. If ...
  • Remediation and Hardening Strategies for Microsoft 365 to Defend Against UNC2452
    In December 2020, FireEye uncovered and publicly disclosed a widespread attacker campaign that is being tracked as UNC2452. In some, but not all, ...

Sophos

  • US administration adds “subliminal” ad to White House website
    Hiding digital "secrets" where they're supposed to be found is good fun. Just don't hide actual secrets and hope no one will notice!
  • S3 Ep16: Darkweb bust, security at home, and browser snoopage [Podcast]
    Here's the latest podcast - listen now!
  • Has the coronavirus pandemic affected Apple’s hardware design?
    The more things change... the more they stay the same!

Proofpoint

  • Investor Overview Presentation - 2020

Gigamon

  • ThreatINSIGHT 3.3 Enabling Discovery of Hidden Threats and Rapid Investigations
    A pillar of the Gigamon ThreatINSIGHT™ and Applied Threat Research (ATR) team is to continue to innovate and expand the product’s capacity to dism ...
  • DNS C2 Sandwich: A Novel Approach
    Threat actors have been using the domain name system (DNS) for command and control (C2) for years. DNS is a useful channel for malware C2 for many rea ...
  • Silver Linings: How Working from Home Strengthened Our Global Workforce
    As we approach the holiday season and the end of what was arguably the most challenging year of the 21st century, I’ve been reflecting on how much w ...

Trend Micro

  • Nothing to display ...

Menlo Security

  • Isolate and Liberate
    Isolate and Liberate

    How Web Isolation Is Setting the Stage for a New, Future-ready Approach to Security.

    Imagine you’re an Olympic sprinter. The starting gun is about to go off when race officials announce a late change. You’ll need to hop a zig-zag pattern on one foot while still maintaining your original two-foot qualifying speed—or face a DQ.

     

  • Increase In Attack: SocGholish
    Increase In Attack: SocGholish

    Menlo Labs has uncovered a increase in a drive-by attack that impersonates legitimate browser, Flash, and Microsoft Teams updates

     

    In the last two months, the Menlo Labs team has witnessed a surge in drive-by download attacks that use the “SocGholish” framework to infect victims. This particular framework is known to be widely used to deliver malicious payloads by masquerading as a legitimate software update. Isolation prevents this type of attack from delivering its payload to the endpoint. Here’s what we know.

     

  • 2021 Threat Landscape
    2021 Threat Landscape

    What to Look for in the New Year

    I have good news and bad news. The good news is that the most difficult year in recent memory is almost over. By my count, we have less than 20 days to go, and that’s clearly not enough time for the murder hornets to make a comeback and take over the world.

Copyright 2012 - 2020 The Cyber Chronicle | All Rights Reserved |