F5 to Acquire Volterra to Create the First Edge 2.0 Platform for Enterprises and Service Providers
Volterra enables a new Edge 2.0 open edge platform that will transform F5’s leadership position in enterprise application security and delivery, addressing the challenges inherent with first-generation edge solutions.
Meet Challenges with an Agile Infrastructure (Pure Storage)
With the expedited pace of operations, it’s critical to maintain the performance of mission-critical workloads. A solution that offers 100% all-flash end-to-end NVMe and NVMe-oF arrays can deliver the performance you need.
Third malware strain discovered in SolarWinds supply chain attack
Once a build command was detected, the malware would silently replace source code files inside the Orion app with files that loaded the Sunburst malware, resulting in Orion app versions that also installed the Sunburst malware.
Going Rogue – a Mastermind Behind Android Malware Returns with a New RAT (Check Point)
Cybercriminals are well aware of the vital role that mobile devices play in people’s lives, and of the value of the personal and corporate data and credentials that are stored on those devices. The mobile threat landscape is evolving rapidly, and mobile malware is a significant threat to both personal and enterprise security.
Breach of Trust: How Cyber-Espionage Thrives On Human Nature (CyberArk)
Cyber attacks thrive less on shadowy quick strikes at specific targets, and more on slow, quiet infiltration buttressed by very personal and seemingly normal direct contact with their victims.
ICYMI: Gotham Technology Group was named Citrix 2020 North America / Americas Enterprise Partner of the Year at Citrix’s Field Kickoff event yesterday afternoon
Attackers Exploit Poor Cyber Hygiene to Compromise Cloud Security Environments
CISA has released Analysis Report AR21-013A: Strengthening Security Configurations to Defend Against Attackers Targeting Cloud Services which provides technical details and indicators of compromise to help detect and respond to potential attacks.
Stop Phishing and Cut Encrypted Exfiltration and Communication (F5)
Phishing and spearphishing attacks have drastically increased throughout 2020, driven by the threat of a worldwide pandemic, nations under quarantine or lockdown, workers who must work from home, and even contentious elections in the U.S. and other nations.
Join Gotham and Palo Alto Networks for a virtual Ultimate Test Drive workshop on January 20 at 11 AM. In this virtual workshop, you’ll see how Palo Alto’s industry defining technology can help keep your business safe. See the link below for details.
Detection On Demand, One Year Later (FireEye)
In addition to rendering a malicious or not verdict for each submission, customers will benefit from supporting details such as file, registry, process and network changes. Verdicts are delivered almost instantly and quickly allow applications to process without the latency of other solutions.
Microsoft Continues to be Most Imitated Brand for Phishing Attempts in Q4 2020
In Q4, Microsoft was again the brand most frequently targeted by cybercriminals, as it was in Q3 2020. Forty-three percent of all brand phishing attempts related to the technology giant (up from 19% in Q3), as threat actors continued to try to capitalize on people working remotely during the Covid-19 pandemic’s second wave.