LoudMiner uses virtualisation software to mine cryptocurrency
ESET researchers have discovered an unusual cross-platform cryptocurrency miner called LoudMiner. LoudMiner uses virtualization software - QEMU (short for Quick Emulator) on macOS and VirtualBox on Windows - to mine cryptocurrency on a Tiny Core Linux virtual machine....
Four essential cloud security concepts
Possibly the most important attribute of the cloud is that critical business applications, can be deployed, managed, and distributed faster and easier than by any other method, giving employees and customers real-time access to critical information--wherever they are...
BT enhances its cyber capabilities in Europe
BT has announced the opening of a new Cyber Security Operations Centre (Cyber SOC) in Paris, as well as announcing upgraded facilities, new customer solutions and recruitment at its existing SOCs in Madrid and Frankfurt. BT’s global network of Security Operations...
Imperial College protects research data with software-defined storage
Solutions from ArcaStream and Excelero are part of a new software-defined storage deployment at Imperial College London, one of the world's leading university research centres for science, engineering, medicine and business. By moving to a single high-performance...
Demystifying cloud cybersecurity
With the rise of edge data centres and an increase in cloud-based computing, companies are facing new challenges in end-to-end cybersecurity. To ensure proper protection, data centre teams must now assess both internal processes and strategies used by cloud suppliers....
Eset is Canalys cybersecurity champion
Eset has achieved Champion status globally for the first time in Canalys Cybersecurity Leadership Matrix 2019. Canalys is a leading global technology market analyst firm with a channel focus; it strives to guide clients on the future of the technology industry and to...
Building a zero trust environment
People are the new perimeter and identity is at the very core of maintaining a secure, trusted environment. New technologies and trends, including the mobile workforce, BYOD, IoT, digital transformation, and the consumerisation of IT, are shifting identity and access...
Unseen cloud threats exposed
Check Point Software Technologies has announced the release of CloudGuard Log.ic, a solution which delivers cloud-native threat protection and security intelligence. Using CloudGuard Log.ic, customers can now see every data flow and audit trail in today’s elastic...
Hacking group uses steganography to fly under security radar
Kaspersky researchers have uncovered a highly sophisticated cyberespionage campaign aimed at stealing information from South Asian diplomatic, government and military entities. The campaign lasted almost six years and had ties to other recent attacks detected in the...
AI in cybersecurity – friend or foe?
It’s no news that advances in AI and machine learning have enormous transformative potential for cybersecurity defences. Simon McCullough, major channel account manager at F5 Networks However, rapid advances in technology also result in big opportunities for hackers...
Sophos boosts Intercept X for Server
Sophos has announced Intercept X for Server with Endpoint Detection and Response (EDR). By adding EDR to Intercept X for Server, IT managers can investigate cyberattacks against servers, a sought-after target due to the high value of data stored there. Cybercriminals...
Arcserve enables system and application availability
Arcserve has announced the newest version of Arcserve Replication and High Availability (RHA), which delivers high availability combined with heartbeat-powered automatic failover, and continuous data protection for Windows and Linux applications and systems...