Vendor specific news

Vendor announcements


Akamai’s Commitment to Reliability

For more than 20 years, Akamai has worked very hard to earn the trust and confidence of our customers and


Clubhouse Ditches Exclusivity with General Release | Avast

Social media app Clubhouse, for which member invitations were highly coveted throughout the pandemic, has ditched its invite-only exclusivity with


Multiple Vulnerabilities Patched in WordPress Download Manager

On May 4, 2021, the Wordfence Threat Intelligence Team initiated the responsible disclosure process for WordPress Download Manager, a WordPress


Holiday Readiness: What You Should Be Thinking About Four Months Out

This is a blog series about Akamai solutions that can help you manage the surge of traffic (both good and


Zero Trust Should Not Give IT a Bad Name

Maybe you’ve just found out that your company’s IT organization is implementing Zero Trust. Does that mean they don’t trust


Reviewing An Ugly Truth | Avast

New York Times reporters Sheera Frenkel and Cecilia Kang have been covering the trials and tribulations of Facebook for the


PowerEdge XR11/XR12: Designed for Challenges of O-RAN Deployments

Meet our new NEBS compliant servers purpose-built for Telecom Edge environments.Blog – Dell TechnologiesRead More


Crypto Exchange Scams | Avast

You may already have won! How many scams have begun with these words?  There is a new breed of scammers


Helping Your Data Scientists Make You Smarter, Faster

Dell IT is growing its data science platform with a goal to make all of Dell’s applications AI- and ML-


Check Point Software’s Mid-Year Attack Trends Report Reveals A 29% Increase In Cyberattacks Against Organizations Globally

‘Cyber Attack Trends: 2021 Mid-Year Report’ uncovers how cybercriminals have continued to exploit the Covid-19 pandemic and highlights a dramatic


Tech Support Scammer Language | Avast

Have you ever gotten a call from an unknown number claiming that there’s a serious problem with your computer? It’s


Microsoft researcher found Apple 0-day in March, didn’t report it

Ut tensio, sic uis! Does twice the bug pile on twice the pressure to fix it?Naked SecurityRead More


Making Client Certificates Available By Default in Firefox 90

  Starting with version 90, Firefox will automatically find and offer to use client authentication certificates provided by the operating


Customer-driven Expertise Powers Success

Gartner cites anti-ransomware, VMware integration and solution selling as key strengths for Dell Technologies.Blog – Dell TechnologiesRead More


You’ve Found a Vulnerability! Now What? A Guide to Responsible Disclosure.

Information security researchers make a valuable contribution to our online security by finding vulnerabilities and facilitating getting them fixed. Wordfence


Cyber Shield 21 | Avast

Earlier this month, I had the unique opportunity to observe the National Guard conduct its cybersecurity exercises at Cyber Shield


Transforming the Network with OEM NEP Partner-Designed Solutions

We are now at the intersection of edge and 5G and Communications Service providers are ideally positioned to capitalize on


Software-Defined Networking Concept Adoption at Akamai

Akamai engineering has adopted new technology concepts to enhance and expand routing capabilities at the edge. Previously, Akamai’s traffic-steering capabilities


World-Class OTT Streaming from MwareTV with Akamai

Since the onset of the pandemic, home entertainment has never been more important. Millions of users across the globe have


Time-proven tricks in a new environment: the macOS evolution of Formbook

The vast majority of threats for macOS are Adware such as Shlayer, Bundlore, Pirrit, and others. Compared to Windows, we


Apple emergency zero-day fix for iPhones and Macs – get it now!

You’re probably expecting us to say, “Patch early, patch often.” And that is EXACTLY what we’re saying!Naked SecurityRead More


All Access Is (or Should Be) Remote Access

With the transition to remote work, we often hear the term remote access used in unison. Typically, remote work application


Cutting the Red Tape: Lessons Learned from CyberThreats 2021

If I had a dollar for every time I heard the phrase "digital transformation," I would have a lot of


Apple Hide My Email | Avast

We’re continuing to analyze and review the upcoming privacy features which will be included in Apple’s iOS 15 and Monterey


26th July – Threat Intelligence Report

For the latest discoveries in cyber research for the week of 26th July, please download our Threat Intelligence Bulletin. Top


Anyone for Alphabet Soup? ZTNA, SWGs, MFA, and More: Lessons Learned from Fed Day CyberThreats 2021

Last week, we gathered a few of the most prominent leaders and experts from every corner of the federal space


G2A’s Journey to Global Growth, Part 1: Keeping Gamers and Geeks Playing During a Pandemic

Near the end of March 2020, G2A.COM saw its traffic virtually double overnight. The pandemic had just begun, and people


Why Zero Trust Needs the Edge

Backhauling traffic destroys performance, and backhauling attack traffic can destroy even more. Nevertheless, in a traditional security deployment model, we


Windows “PetitPotam” network attack – how to protect against it

A cute name but an annoying and potentially damaging attack. Here’s what to do.Naked SecurityRead More


US court gets UK Twitter hack suspect arrested in Spain

O, what a tangled web we weave/When first we practise to deceive!Naked SecurityRead More


Instagram Introduces Sensitive Content Control | Avast

This week, parent company Facebook announced that it was rolling out Sensitive Content Control on Instagram, a filter to limit


Akamai Summarizes Service Disruption (RESOLVED)

At 15:46 UTC today, a software configuration update triggered a bug in the DNS system, the system that directs browsers


Simplifying SaaS Data Protection on AWS Marketplace

PowerProtect Backup Service on AWS simplifies deployment and acquisition for SaaS-based protection, built on AWS.Blog – Dell TechnologiesRead More


PowerScale: Storage Optimized for HPC in Semiconductor Design Environments

See how your organization can take advantage of Dell EMC PowerScale to achieve optimal performance for HPC workload in semiconductor


Avast Receives AV-Comparatives Approved Business Product Award | Avast

Following up on our big win at the end of 2020, we’re now excited to announce that Avast Business Antivirus


Top 5 Security Tips for SMBs | Avast

I have the pleasure of leading the Avast Red Team, a specialized unit dedicated to protecting our business applications, products


Pegasus And Spyware | Avast

Earlier in July, a group of security researchers revealed that they had been working together to uncover a widespread surveillance


CISO’s Survival Guide: Emerging trends from the startup ecosystem

For this year’s CISO Survival Guide, we decided to partner closely with three other leading cybersecurity-focused venture capital firms. More


Gee Rittenhouse and Cisco’s vision to democratize security

Learn Cisco’s vision for security, three critical priorities for the SecureX portfolio and Cisco’s contributions to global cybersecurity. More RSS


Nulled WordPress Plugins – Dangers and Downsides

In our 2020 Threat Report, the Wordfence Threat Intelligence Team identified malware distributed via nulled, pirated, or counterfeit plugins and


Windows “HiveNightmare” bug could leak passwords – here’s what to do!

Windows “hives” contain registry data, some of it secret. The nightmare is that these files aren’t properly protected against snooping.Naked


Bridging the Data Divide with Dell Technologies and Vertica

Learn how object based data lakes are giving data teams the power of choice in data analytic workloads.Blog – Dell


Digital Wallets And Driver’s Licenses | Avast

One of the less publicized features of the upcoming Apple iOS 15 is the ability to add your driver’s license


Top prevalent malware with a thousand campaigns migrates to macOS

From a simple keylogger to a top prevalent malware Formbook is currently one of the most prevalent malware. It has


Latest Cisco AppDynamics App Attention Index Reveals Brands Have Only One Shot to Win Over Customers

More RSS Feed: …The Network: Top StoriesRead More


Dell EMC PowerEdge and VMware Tanzu – Let the Games Begin

Team up with PowerEdge and VMware to evolve your technology ecosystem to support the massive container growth and simplify needs


Zero Trust Network Access Is an Oxymoron

Though Zero Trust is really quite simple and should be viewed as a very strong form of the age-old principle


Apple iPhone patches are out – no news if recent Wi-Fi bug is fixed

Remember that weird iPhone Wi-Fi bug from a week or so ago? Let’s hope this update patches it!Naked SecurityRead More


Realize the Value of APEX Data Storage Services

Key findings on the cost savings and business benefits of storage as-a-Service with Dell Technologies APEX from Forrester.Blog – Dell


Keep Your Ear to the Ground

Are you ready for what’s next in software and digital infrastructure? Matt Baker, Dell’s SVP of Strategy, lays out a


Who Can See Your Address Online? | Avast

Finding out someone’s address used to be kind of hard — or at least took some effort. I’m old enough


Stopping FTP support in Firefox 90

  The File Transfer Protocol (FTP) has long been a convenient file exchange mechanism between computers on a network. While


Cisco Fellow Nancy Cam-Winget: A passion for making technologies useful

We sit down with new Cisco Fellow Nancy Cam-Winget and discuss her achievements, todayâ€TMs cybersecurity landscape, and More RSS Feed:


Cyber Academy – Botnets

In this episode of “Cyber Academy, we will talk about Botnets. What are Botnets used for? How does the Botmaster,


The state of ransomware: Cisco’s Matt Olney on how to prepare

The Director of Threat Intelligence & Interdiction shares recommendations when facing at More RSS Feed: …The Network: Security NewsRead


19th July – Threat Intelligence Report

For the latest discoveries in cyber research for the week of 19th July, please download our Threat Intelligence Bulletin. Top


Android Security: Over 150 Security and Privacy Issues Found on Stalkerware

Who stalks the stalkers? When it comes to Android security, stalkerware presents a double risk.  It’s common knowledge that mobile


DLm Enhancements Deliver PowerScale, Isilon Connectivity

Dell EMC expands mainframe virtual tape options again, the next chapter in a long history of storage choice for all


Debuting the Rugged PowerEdge XR11 & XR12 Servers

If you need flexibility plus extraordinarily high levels of Tier 1 compute in the tightest spots at the toughest edge,


Consumer Data And Privacy | Avast

In this post, we will explain exactly why customer data is valuable and why it is so important for businesses


Airtel launches Cisco next-gen SD-WAN connectivity solutions for enterprises

More RSS Feed: …The Network: Top StoriesRead More


Episode 125: Critical SQL Injection Vulnerability Patched in WooCommerce

A critical SQL injection vulnerability was discovered in WooCommerce, the most popular e-Commerce plugin used by over 5 million WordPress


More PrintNightmare: “We TOLD you not to turn the Print Spooler back on!”

The PrintNightmare continues. So does our advice, even though it stops your printer working.Naked SecurityRead More


Want to earn $10 million? Snitch on a cybercrook!

Will going after the big guns help to discourage and disrupt the rest of the cybercrime ecosystem? Have your say…Naked


The Security Threat of Voice Cloning | Avast

Advances in voice cloning have brought computer-generated audio to a level the BBC reports “is now said to be unnervingly


Webinar: Dell Technologies Hardware and Software Portals Cybersecurity

Join our online support panel of experts LIVE on Thursday, July 29 at 11:00 AM CST to discuss the latest


Critical SQL Injection Vulnerability Patched in WooCommerce

On July 14, 2021, WooCommerce released an emergency patch for a SQL Injection vulnerability reported by security researcher Thomas DeVoss


The Code Red worm 20 years on – what have we learned?

“It was 20 years ago today…” that we learned a few lessons that are well worth revisiting!Naked SecurityRead More


Zero Trust: Not As Scary As It Sounds

If the term Zero Trust has been popping up in your news feed with astonishing frequency lately, you may be


Avast Hacker Archives Episode 8 – Dave Aitel | Avast

“I’ve always found the best way to get a kid to learn how to hack is to tell them to


KloudspotTM and Cisco Meraki Enable Safe Environments and Smart Spaces

Situational Awareness and Location Intelligence Platform and Camera Analytics Solutions now available to Cisco Meraki Cus More RSS Feed:


Home delivery scams get smarter – don’t get caught out

We’ve said it before, and we’ll say it again: don’t be in too much of a hurry for those home


Location- and Device-agnostic Security for the Mobile Workforce

I’ve spent my entire career in technology and can still recall the time when a desktop PC was the only


Streaming Numbers Jump for European Football Tournament Delivered by Akamai

The video streaming traffic that Akamai delivered for more than 30 rights-holding customers during the July 11 Italy-England football (soccer)


Expanding Your Innovation Engine with Dell EMC PowerEdge Servers

New PowerEdge servers purpose-built for edge and telecom environments.Blog – Dell TechnologiesRead More


How To Clean Up Your Digital Footprint | Avast

Now that you’ve read our blog entry, “What is your digital footprint?”, you know everything you share and do online


Common WordPress Vulnerabilities and Prevention Through Secure Coding Best Practices

WordPress has experienced exponential growth in the past several years and now holds over 42% of the CMS market share


Mind the Gap: Securely Embracing the Digital Explosion

State and local governments are weathering a digital explosion. The move to "virtual everything" means that greater amounts of information


Firefox 90 introduces SmartBlock 2.0 for Private Browsing

Today, with the launch of Firefox 90, we are excited to announce a new version of SmartBlock, our advanced tracker


Zero Trust: The Protection Model for the Post-Pandemic World

One year and a half following the start of the COVID-19 pandemic, we’re seeing most companies either maintaining their remote


Crypto-Based Phishing Scams | Avast

Since the beginning of 2021, there’s been a rise in the prevalence of crypto-related phishing sites in certain parts of


Automotive Manufacturers Start Thinking Seriously About Cybersecurity

Cybersecurity threats for autonomous vehicles are rapidly evolving. Here’s what manufacturers can do to avoid them.Blog – Dell TechnologiesRead More


Cyber Academy – Viruses, Worms and Trojans Iframe

In this episode of “Cyber Academy” we will talk about viruses, worms and trojans. What is the difference between these


Don’t get tricked by this crashtastic iPhone Wi-Fi hack!

Learn how the trick works so that you can avoid it in case someone thinks it’s a joke to catch


12th July – Threat Intelligence Report

For the latest discoveries in cyber research for the week of 12th July, please download our Threat Intelligence Bulletin. Top


Scammers Poured Themselves a Glass and Got to Work on Wine-Themed Phishing Emails in 2020

Lots of people opened up bottles of wine on Zoom visits in isolation. And, 2020 saw rising wine sales and


Google FLoC | Avast

Earlier this year, Google announced a new way for advertisers to reach consumers without using cookies to track them individually


Firefox 90 supports Fetch Metadata Request Headers

  We are pleased to announce that Firefox 90 will support Fetch Metadata Request Headers which allows web applications to


Explaining STIX And TAXII Standards | Avast

For many years, cybersecurity companies have invested in building sensor networks and detection capabilities to build a greater understanding of


Where do all those cybercrime payments go?

Yes, the headline is a rhetorical question. But sometimes we get literal answers, and they’re well worth remembering.Naked SecurityRead More


Processing Machine Data With Machine Learning | Avast

This post was written by the following Avast researchers: Petr Somol, Avast Director AI Research Tomáš Pevný, Avast Principal AI


Kaseya And PrintNightmare Vulnerabilities | Avast

“It never rains but it pours.” It’s the saying that describes situations in which several bad things happen at once,


Twitter Considers New Security Features | Avast

Twitter People Experience Designer Lena Emara tweeted 4 new Twitter security feature concepts, asking users for feedback on whether or


Cisco Completes Acquisition of Socio Labs

More RSS Feed: …The Network: Top StoriesRead More


Scale Databases Across Data Centers, Cloud and Edge

Dell Technologies, DataStax and Intel have created a solution for a cloud-native Apache Cassandra deployment built for the data growth


Akamai Helps Q-dance Bring Its Tribe to Defqon.1 at Home — a Global Virtual Festival Experience

Every year, Q-dance (part of the ID&T group), a Dutch electronic music experience company, delights its die-hard fans (or their


How Partnerships Help Agencies Accelerate Custom AI Deployments

Artificial intelligence (AI) and machine learning (ML) are poised to transform military and defense decision-making and operations.Blog – Dell TechnologiesRead


What Is Your Digital Footprint? | Avast

If you’re active online, you have a digital footprint. Everyone does. Every comment made on social media, every news article


Your Most Vulnerable Computer

Would you use a computer without any kind of antivirus? Would you put your personal photos on that device? Use


Sage Advice for Transforming IT in the Data Decade

Finishing the final mile of transformation is not easy. Modernizing IT infrastructure helps you increase agility, enhance service levels, reduce