F5 Networks: Application Lifecycle Focus Is Giving Partners A 'Bigger Piece Of The Pie’
Customers are constantly cycling through developing, deploying, operating and governing code, often across multiple cloud environments. It's a difficult process and the vast majority of customers doing it fast and at scale need help, said F5 Networks President and CEO François Locoh-Donou.
Mobile Security Flaw Leaves Android Smartphones Vulnerable to SMS Phishing Attacks
The vulnerability relies on a process called over-the-air (OTA) provisioning, which is normally used by cellular network operators to deploy network-specific settings to a new phone joining their network.
The Rise of New Tactics in Business Email Compromise
Impersonation attacks, CEO fraud and business email compromise (BEC), showed a steady increase in Q1 2019 and are projected to rise through Q2 2019. Cyber criminals impersonate executives, senior managers and supply chain partners to dupe employees into taking action by authorizing fraudulent wire transfers or providing confidential information.
Pure Storage launches AI Data Hub, builds out AI workflow effort
Pure Storage launched a bevy of artificial intelligence tools, including the AI Data Hub, which are designed to meld storage and AI workflows from design to deployment.
IGEL Featured in 2019 CRN Cloud Partner Program Guide
IGEL’s next-gen edge OS is the perfect onboarding solution for today’s leading cloud workspace platforms from Amazon, Citrix, Microsoft and VMware.
Emotet is back after a summer break
At the beginning of June 2019, Emotet's operators decided to take an extended summer vacation. Even the command and control (C2) activities saw a major pause in activity. However, as summer begins drawing to a close, Talos and other researchers started to see increased activity in Emotet's C2 infrastructure.
Pure’s Modern Data Experience: Transforming the Customer Approach to IT
As the only data storage vendor to offer all of its core products as a service today, Pure delivers the Modern Data Experience -- simple, seamless and sustainable.
Magecart Skimming Attack Targets Mobile Users of Hotel Chain Booking Websites
We discovered a series of incidents where the credit card skimming attack Magecart was used to hit the booking websites of chain-brand hotels — the second time we’ve seen a Magecart threat actor directly hit ecommerce service providers instead of going for individual stores or third-party supply chains.
What’s new with Citrix Virtual Apps and Desktops: September 2019
As usual, we’ve got some amazing new updates coming for our Citrix Virtual Apps and Desktops customers. But most importantly, we have some exciting news for customers who are waiting for updates about our next Long-Term Service Release.
August 2019’s Most Wanted Malware: Echobot Launches Widespread Attack Against IoT Devices
The Research team is warning organizations of a new variant of the Mirai IoT Botnet, Echobot, which has launched widespread attacks against a range of IoT devices.