A10 Networks’ Threat Research Detects and Tracks Origins of DDoS Weapons; Observes Over 15 Million Weapons

Organizations Increasingly Employ Zero Trust Principles to Protect Digital Infrastructure SAN JOSE, Calif. – May 4, 2022 – It is well-reported that the pandemic caused a spike in cyberattacks, including malware, ransomware and DDoS attacks. Threat actors have sought to disrupt not only services people rely on everyday like healthcare, education and financial but alsoContinue reading “A10 Networks’ Threat Research Detects and Tracks Origins of DDoS Weapons; Observes Over 15 Million Weapons”

CVE-2021-44228 vulnerability on Log4j

Due to the recent announcement, the vulnerability log4shell affecting the Log4j library provided by Apache. What’s know so far: The library is used in many implementations, from Apache Struts to Microsoft’s Minecraft, and the list is likely to grow, Apache itself recommends the upgrade to v2.15.0. It is affected by an unauthenticated remote code executionContinue reading “CVE-2021-44228 vulnerability on Log4j”

Encrypted Traffic Inspection for Cyber Security Survey Report

Encrypted Traffic Inspection for Cyber Security Survey Report Since public data around security solutions and encrypted threats is scarcely available online, this report helps us better understand the current state of the market. Here are some interesting highlights from the survey: We had 200 respondents in total. 85% of the respondents were from North AmericaContinue reading “Encrypted Traffic Inspection for Cyber Security Survey Report”

What is Attack Surface Management (ASM)?

In modern business environments, organizations are facing increased pressure to adopt digital solutions to stay competitive. While these solutions have undoubted benefits for organizations, they also expand their potential attack surface and expose them to increased levels of cyber risk. If left unaddressed, these risks can create critical security gaps that can be exploited byContinue reading “What is Attack Surface Management (ASM)?”

What is Ransomware-as-a-Service (RaaS)?

News of ransomware attacks disrupting supply chains has increased recently. As threat actors disrupt businesses and critical infrastructure, they may appear to be working harder. However, cybercriminals treat ransomware as a business, enabling an underground industry. Ransomware-as-a-Service (RaaS) is a growing underground industry that continues to place sensitive information at risk.

澳門電訊辦網安攻略分享會

【特訊】隨著社會數碼化轉型步伐不斷加快,各項智慧應用及生活場景逐步走入我們的生活,大量數據傳輸透過網絡進行交互,讓「網絡安全」變得尤為重要,作為基礎網絡營運商及智慧應用服務供應商,澳門電訊透過引進及投資網絡安全防護技術,守護澳門網絡安全,從而提升社會對網絡安全的重視程度,澳門電訊攜手合作夥伴,舉辦了「網絡安全」攻略分享會,分享現時流行的網絡攻擊形式及應對方案。 CTM「網絡安全」攻略分享會於上周五(七月九日)假澳門美高梅舉行,澳門電訊與Fortinet、ExclusiveNetworks、A10Networks、IUWorld及NSFOCUS公司代表,透過簡單生動的案例,分享網絡安全案例、現今主流的防護應用及技術,以及共同探討如何配合「網安法」,讓受監管的營運實體及機構合規運營以及避免網絡安全問題,「守護」線上應用、「防範」資料外洩,提高安全性以確保服務及業務的穩定。 A10Networks技術經理蕭漢明分享了澳門在今年上半年受到DDoS的威脅情況,以及如何透過CTM安全服務,在安全控制點上優化安全策略等。澳門電訊資訊科技高級經理鄭貴昌就網絡攻擊趨勢及案例進行分享。與會者分別來自政府、本地中小企業等,反映出社會對網絡安全的重視程度,未來,澳門電訊會繼續透過引進和研發更多安全應用,發揮好網絡把關人的角色,守護澳門網絡安全,以及助力各界提升網絡安全級別。

IT Development to lead the way in GBA

Hong Kong, Guangdong and Macao have jointly launched the Greater Bay Area (GBA) International Information Technology Association, which aims to boost information technology (IT) development and application in the regions. The association plans to undertake related policy research work, setup communication and cooperation platforms for enterprises to enhance their regional connectivity, and nurture young ITContinue reading “IT Development to lead the way in GBA”

Ridge Security Automated Penetration Testing Solution Delivers Advanced Post-Exploitation Techniques

Ridge Security, cutting-edge automated penetration testing solution provider, announces new capabilities in RidgeBot 3.4, for post-exploitation validation. This new release further differentiates RidgeBot from vulnerability scanners and 1-step auto-exploitation tools that are currently available and strengthens RidgeBot’s position as a true risk-based vulnerability management platform. Post-exploitation operations are advanced hacking techniques, often utilized by an APT (AdvancedContinue reading “Ridge Security Automated Penetration Testing Solution Delivers Advanced Post-Exploitation Techniques”

Integrating Cybersecurity into Business Continuity Planning

Organizations can’t afford to wait until a threat is identified to start worrying about their #cybersecurity. Measures must be integrated throughout the entire process! Learn more about integrating cybersecurity into business continuity planning –> http://ow.ly/yXya50EKVo5