This is the second in our series of blogs about the quantum threat and preparing for “Q-Day,” the moment when cryptanalytically relevant quantum computing (CRQC) will be able to break all public-key cryptography systems in operation today. The first blog provided an overview of cryptography in a post-quantum world, and this one explores what comes next. What it will take to … [Read more...] about Quantum Cryptography: What’s Coming Next
News
Germany Disrupts BADBOX Malware on 30,000 Devices Using Sinkhole Action
Dec 14, 2024Ravie LakshmananBotnet / Ad Fraud Germany's Federal Office of Information Security (BSI) has announced that it has disrupted a malware operation called BADBOX that came preloaded on at least 30,000 internet-connected devices sold across the country. In a statement published earlier this week, authorities said they severed the communications between the devices and … [Read more...] about Germany Disrupts BADBOX Malware on 30,000 Devices Using Sinkhole Action
Thai Officials Targeted in Yokai Backdoor Campaign Using DLL Side-Loading Techniques
Dec 14, 2024Ravie LakshmananMalware / Cyber Threat Thai government officials have emerged as the target of a new campaign that leverages a technique called DLL side-loading to deliver a previously undocumented backdoor dubbed Yokai. "The target of the threat actors were Thailand officials based on the nature of the lures," Nikhil Hegde, senior engineer for Netskope's Security … [Read more...] about Thai Officials Targeted in Yokai Backdoor Campaign Using DLL Side-Loading Techniques
Cisco Secure Workload: Leading in Segmentation Maturity
As cyber threats evolve, defending workloads in today’s multi-cloud environments requires more than traditional security. Attackers are no longer simply at the perimeter; they may already be inside, waiting to exploit vulnerabilities. This reality demands a shift from just keeping threats out to minimizing their impact when they breach. Cisco Secure Workload is at the forefront … [Read more...] about Cisco Secure Workload: Leading in Segmentation Maturity
Apple honors 2024 App Store Award winners
December 11, 2024 PRESS RELEASE Apple honors 2024 App Store Award winners Apple celebrates the best apps and games of the year, recognizing 17 talented developers for exceptional experiences on the App Store CUPERTINO, CALIFORNIA Apple today revealed the winners of the 2024 App Store Awards, honoring 17 apps and games that helped users ignite their creativity, achieve new … [Read more...] about Apple honors 2024 App Store Award winners
The Customer Adoption Journey of Cisco Secure Workload
In today’s rapidly evolving threat landscape, securing workloads across diverse environments is critical for organizations of all sizes. Cisco Secure Workload (formerly Tetration) provides end-to-end visibility, microsegmentation and advanced security capabilities for workloads deployed across data centers and cloud environments. This blog post explores the customer adoption … [Read more...] about The Customer Adoption Journey of Cisco Secure Workload
390,000+ WordPress Credentials Stolen via Malicious GitHub Repository Hosting PoC Exploits
Dec 13, 2024Ravie LakshmananCyber Attack / Malware A now-removed GitHub repository that advertised a WordPress tool to publish posts to the online content management system (CMS) is estimated to have enabled the exfiltration of over 390,000 credentials. The malicious activity is part of a broader attack campaign undertaken by a threat actor, dubbed MUT-1244 (where MUT refers … [Read more...] about 390,000+ WordPress Credentials Stolen via Malicious GitHub Repository Hosting PoC Exploits
Rate Companies Scales Cybersecurity with Falcon Flex
Rate Companies (formerly Guaranteed Rate) is the second-largest retail mortgage lender in the U.S. With billions of sensitive transactions flowing through its systems daily, the company is a prime target for cybercriminals. “Because of the nature of our business, we face some of the most advanced and persistent cyber threats out there,” said Katherine Mowen, SVP of … [Read more...] about Rate Companies Scales Cybersecurity with Falcon Flex
How Generative AI Can Transform the Future of Identity and Access Management
Identity and Access Management (IAM) plays a vital role in keeping enterprise systems secure by ensuring that only the right people can access sensitive data, applications, and systems. As businesses continue to embrace digital platforms, the demand for stronger and more adaptable IAM solutions is growing. Traditional systems often struggle to keep pace with evolving security … [Read more...] about How Generative AI Can Transform the Future of Identity and Access Management
How Cisco Uses Isovalent to Secure Cloud Workloads
As cloud environment evolve, efficient and effective workload security has been at the top of the list. At Cisco, we have integrated the Isovalent platform into our infrastructure to ensure our cloud workloads are protected without compromising on performance. Why Isovalent? The Isovalent platform is based on the eBPF (extended Berkeley Packet Filter) technology that … [Read more...] about How Cisco Uses Isovalent to Secure Cloud Workloads