New Zealand's leading source of cybersecurity and threat news
These search results are from across the Techday Network of sites
Pseudo-ransomware Xbash targeting Linux and Windows discovered
Xbash is data-destructive; destroying Linux-based databases as part of its ransomware capabilities.
A look at the evolution of the Nemucod malware
Unit 42 researchers have uncovered details about how the slippery Nemucod malware has been able to avoid detection.
Kazuar trojan hijacks Microsoft .NET framework to conduct espionage attacks
Researchers have uncovered the ‘Kazuar’ backdoor trojan, which has been detected in espionage campaigns across the globe, Unit 42 reports.
Unit 42 researchers suspect Ewind adware Trojan is 100% Russian
The Android Ewind family has just become a little bigger, after Unit 42 researchers discovered multiple new samples of the family.
Amnesia malware forms DVR botnet and wipes virtual machines
'Amnesia', the new IoT botnet variant of 'Tsunami' targets an unpatched remote code execution vulnerability in DVR devices made by TVT Digital.
Unit 42 reports 'Blank Slate' malspam campaign pummels hosting providers in 'cycle of abuse'
Unit 42 has provided an inside look at how a malicious spam campaignis using double-zipped Word files to spread ransomware on Windows computers.
The crucial guide to deploying a SIEM solution successfully
SIEM solutions have far-reaching benefits, but Gartner says there are a lot of factors to consider to avoid disaster - here's the company's guide.
Whitepaper: How to make sure your security architecture keeps up with surging network speeds
The annual cost of cybercrime is expected to exceed US$6t by 2021 with a large contributor being the sheer amount of data that requires processing.
Whitepaper: The key to compliance is governing access to data
By implementing a governance-based approach to identity governance, companies can secure their organisation’s sensitive data.
What does sustainable compliance look like?
Getting an organisation compliant is one thing, keeping it that way is another.
The six golden keys to successful identity assurance
When someone tries to access your internal systems, how can you be sure a user is who they claim to be?