Vendor specific news

Vendor announcements

  

Akamai’s Commitment to Reliability

For more than 20 years, Akamai has worked very hard to earn the trust and confidence of our customers and

  

Clubhouse Ditches Exclusivity with General Release | Avast

Social media app Clubhouse, for which member invitations were highly coveted throughout the pandemic, has ditched its invite-only exclusivity with

  

Multiple Vulnerabilities Patched in WordPress Download Manager

On May 4, 2021, the Wordfence Threat Intelligence Team initiated the responsible disclosure process for WordPress Download Manager, a WordPress

  

Holiday Readiness: What You Should Be Thinking About Four Months Out

This is a blog series about Akamai solutions that can help you manage the surge of traffic (both good and

  

Zero Trust Should Not Give IT a Bad Name

Maybe you’ve just found out that your company’s IT organization is implementing Zero Trust. Does that mean they don’t trust

  

Reviewing An Ugly Truth | Avast

New York Times reporters Sheera Frenkel and Cecilia Kang have been covering the trials and tribulations of Facebook for the

  

PowerEdge XR11/XR12: Designed for Challenges of O-RAN Deployments

Meet our new NEBS compliant servers purpose-built for Telecom Edge environments.Blog – Dell TechnologiesRead More

  

Crypto Exchange Scams | Avast

You may already have won! How many scams have begun with these words?  There is a new breed of scammers

  

Helping Your Data Scientists Make You Smarter, Faster

Dell IT is growing its data science platform with a goal to make all of Dell’s applications AI- and ML-

  

Check Point Software’s Mid-Year Attack Trends Report Reveals A 29% Increase In Cyberattacks Against Organizations Globally

‘Cyber Attack Trends: 2021 Mid-Year Report’ uncovers how cybercriminals have continued to exploit the Covid-19 pandemic and highlights a dramatic

  

Tech Support Scammer Language | Avast

Have you ever gotten a call from an unknown number claiming that there’s a serious problem with your computer? It’s

  

Microsoft researcher found Apple 0-day in March, didn’t report it

Ut tensio, sic uis! Does twice the bug pile on twice the pressure to fix it?Naked SecurityRead More

  

Making Client Certificates Available By Default in Firefox 90

  Starting with version 90, Firefox will automatically find and offer to use client authentication certificates provided by the operating

  

Customer-driven Expertise Powers Success

Gartner cites anti-ransomware, VMware integration and solution selling as key strengths for Dell Technologies.Blog – Dell TechnologiesRead More

  

You’ve Found a Vulnerability! Now What? A Guide to Responsible Disclosure.

Information security researchers make a valuable contribution to our online security by finding vulnerabilities and facilitating getting them fixed. Wordfence

  

Cyber Shield 21 | Avast

Earlier this month, I had the unique opportunity to observe the National Guard conduct its cybersecurity exercises at Cyber Shield

  

Transforming the Network with OEM NEP Partner-Designed Solutions

We are now at the intersection of edge and 5G and Communications Service providers are ideally positioned to capitalize on

  

Software-Defined Networking Concept Adoption at Akamai

Akamai engineering has adopted new technology concepts to enhance and expand routing capabilities at the edge. Previously, Akamai’s traffic-steering capabilities

  

World-Class OTT Streaming from MwareTV with Akamai

Since the onset of the pandemic, home entertainment has never been more important. Millions of users across the globe have

  

Time-proven tricks in a new environment: the macOS evolution of Formbook

The vast majority of threats for macOS are Adware such as Shlayer, Bundlore, Pirrit, and others. Compared to Windows, we

  

Apple emergency zero-day fix for iPhones and Macs – get it now!

You’re probably expecting us to say, “Patch early, patch often.” And that is EXACTLY what we’re saying!Naked SecurityRead More

  

All Access Is (or Should Be) Remote Access

With the transition to remote work, we often hear the term remote access used in unison. Typically, remote work application

  

Cutting the Red Tape: Lessons Learned from CyberThreats 2021

If I had a dollar for every time I heard the phrase "digital transformation," I would have a lot of

  

Apple Hide My Email | Avast

We’re continuing to analyze and review the upcoming privacy features which will be included in Apple’s iOS 15 and Monterey

  

26th July – Threat Intelligence Report

For the latest discoveries in cyber research for the week of 26th July, please download our Threat Intelligence Bulletin. Top

  

Anyone for Alphabet Soup? ZTNA, SWGs, MFA, and More: Lessons Learned from Fed Day CyberThreats 2021

Last week, we gathered a few of the most prominent leaders and experts from every corner of the federal space

  

G2A’s Journey to Global Growth, Part 1: Keeping Gamers and Geeks Playing During a Pandemic

Near the end of March 2020, G2A.COM saw its traffic virtually double overnight. The pandemic had just begun, and people

  

Why Zero Trust Needs the Edge

Backhauling traffic destroys performance, and backhauling attack traffic can destroy even more. Nevertheless, in a traditional security deployment model, we

  

Windows “PetitPotam” network attack – how to protect against it

A cute name but an annoying and potentially damaging attack. Here’s what to do.Naked SecurityRead More

  

US court gets UK Twitter hack suspect arrested in Spain

O, what a tangled web we weave/When first we practise to deceive!Naked SecurityRead More

  

Instagram Introduces Sensitive Content Control | Avast

This week, parent company Facebook announced that it was rolling out Sensitive Content Control on Instagram, a filter to limit

  

Akamai Summarizes Service Disruption (RESOLVED)

At 15:46 UTC today, a software configuration update triggered a bug in the DNS system, the system that directs browsers

  

Simplifying SaaS Data Protection on AWS Marketplace

PowerProtect Backup Service on AWS simplifies deployment and acquisition for SaaS-based protection, built on AWS.Blog – Dell TechnologiesRead More

  

PowerScale: Storage Optimized for HPC in Semiconductor Design Environments

See how your organization can take advantage of Dell EMC PowerScale to achieve optimal performance for HPC workload in semiconductor

  

Avast Receives AV-Comparatives Approved Business Product Award | Avast

Following up on our big win at the end of 2020, we’re now excited to announce that Avast Business Antivirus

  

Top 5 Security Tips for SMBs | Avast

I have the pleasure of leading the Avast Red Team, a specialized unit dedicated to protecting our business applications, products

  

Pegasus And Spyware | Avast

Earlier in July, a group of security researchers revealed that they had been working together to uncover a widespread surveillance

  

CISO’s Survival Guide: Emerging trends from the startup ecosystem

For this year’s CISO Survival Guide, we decided to partner closely with three other leading cybersecurity-focused venture capital firms. More

  

Gee Rittenhouse and Cisco’s vision to democratize security

Learn Cisco’s vision for security, three critical priorities for the SecureX portfolio and Cisco’s contributions to global cybersecurity. More RSS

  

Nulled WordPress Plugins – Dangers and Downsides

In our 2020 Threat Report, the Wordfence Threat Intelligence Team identified malware distributed via nulled, pirated, or counterfeit plugins and

  

Windows “HiveNightmare” bug could leak passwords – here’s what to do!

Windows “hives” contain registry data, some of it secret. The nightmare is that these files aren’t properly protected against snooping.Naked

  

Bridging the Data Divide with Dell Technologies and Vertica

Learn how object based data lakes are giving data teams the power of choice in data analytic workloads.Blog – Dell

  

Digital Wallets And Driver’s Licenses | Avast

One of the less publicized features of the upcoming Apple iOS 15 is the ability to add your driver’s license

  

Top prevalent malware with a thousand campaigns migrates to macOS

From a simple keylogger to a top prevalent malware Formbook is currently one of the most prevalent malware. It has

  

Latest Cisco AppDynamics App Attention Index Reveals Brands Have Only One Shot to Win Over Customers

More RSS Feed: newsroom.cisco.com/rss-feeds …The Network: Top StoriesRead More

  

Dell EMC PowerEdge and VMware Tanzu – Let the Games Begin

Team up with PowerEdge and VMware to evolve your technology ecosystem to support the massive container growth and simplify needs

  

Zero Trust Network Access Is an Oxymoron

Though Zero Trust is really quite simple and should be viewed as a very strong form of the age-old principle

  

Apple iPhone patches are out – no news if recent Wi-Fi bug is fixed

Remember that weird iPhone Wi-Fi bug from a week or so ago? Let’s hope this update patches it!Naked SecurityRead More

  

Realize the Value of APEX Data Storage Services

Key findings on the cost savings and business benefits of storage as-a-Service with Dell Technologies APEX from Forrester.Blog – Dell

  

Keep Your Ear to the Ground

Are you ready for what’s next in software and digital infrastructure? Matt Baker, Dell’s SVP of Strategy, lays out a

  

Who Can See Your Address Online? | Avast

Finding out someone’s address used to be kind of hard — or at least took some effort. I’m old enough

  

Stopping FTP support in Firefox 90

  The File Transfer Protocol (FTP) has long been a convenient file exchange mechanism between computers on a network. While

  

Cisco Fellow Nancy Cam-Winget: A passion for making technologies useful

We sit down with new Cisco Fellow Nancy Cam-Winget and discuss her achievements, todayâ€TMs cybersecurity landscape, and More RSS Feed:

  

Cyber Academy – Botnets

In this episode of “Cyber Academy, we will talk about Botnets. What are Botnets used for? How does the Botmaster,

  

The state of ransomware: Cisco’s Matt Olney on how to prepare

The Director of Threat Intelligence & Interdiction shares recommendations when facing at More RSS Feed: newsroom.cisco.com/rss-feeds …The Network: Security NewsRead

  

19th July – Threat Intelligence Report

For the latest discoveries in cyber research for the week of 19th July, please download our Threat Intelligence Bulletin. Top

  

Android Security: Over 150 Security and Privacy Issues Found on Stalkerware

Who stalks the stalkers? When it comes to Android security, stalkerware presents a double risk.  It’s common knowledge that mobile

  

DLm Enhancements Deliver PowerScale, Isilon Connectivity

Dell EMC expands mainframe virtual tape options again, the next chapter in a long history of storage choice for all

  

Debuting the Rugged PowerEdge XR11 & XR12 Servers

If you need flexibility plus extraordinarily high levels of Tier 1 compute in the tightest spots at the toughest edge,

  

Consumer Data And Privacy | Avast

In this post, we will explain exactly why customer data is valuable and why it is so important for businesses

  

Airtel launches Cisco next-gen SD-WAN connectivity solutions for enterprises

More RSS Feed: newsroom.cisco.com/rss-feeds …The Network: Top StoriesRead More

  

Episode 125: Critical SQL Injection Vulnerability Patched in WooCommerce

A critical SQL injection vulnerability was discovered in WooCommerce, the most popular e-Commerce plugin used by over 5 million WordPress

  

More PrintNightmare: “We TOLD you not to turn the Print Spooler back on!”

The PrintNightmare continues. So does our advice, even though it stops your printer working.Naked SecurityRead More

  

Want to earn $10 million? Snitch on a cybercrook!

Will going after the big guns help to discourage and disrupt the rest of the cybercrime ecosystem? Have your say…Naked

  

The Security Threat of Voice Cloning | Avast

Advances in voice cloning have brought computer-generated audio to a level the BBC reports “is now said to be unnervingly

  

Webinar: Dell Technologies Hardware and Software Portals Cybersecurity

Join our online support panel of experts LIVE on Thursday, July 29 at 11:00 AM CST to discuss the latest

  

Critical SQL Injection Vulnerability Patched in WooCommerce

On July 14, 2021, WooCommerce released an emergency patch for a SQL Injection vulnerability reported by security researcher Thomas DeVoss

  

The Code Red worm 20 years on – what have we learned?

“It was 20 years ago today…” that we learned a few lessons that are well worth revisiting!Naked SecurityRead More

  

Zero Trust: Not As Scary As It Sounds

If the term Zero Trust has been popping up in your news feed with astonishing frequency lately, you may be

  

Avast Hacker Archives Episode 8 – Dave Aitel | Avast

“I’ve always found the best way to get a kid to learn how to hack is to tell them to

  

KloudspotTM and Cisco Meraki Enable Safe Environments and Smart Spaces

Situational Awareness and Location Intelligence Platform and Camera Analytics Solutions now available to Cisco Meraki Cus More RSS Feed: newsroom.cisco.com/rss-feeds

  

Home delivery scams get smarter – don’t get caught out

We’ve said it before, and we’ll say it again: don’t be in too much of a hurry for those home

  

Location- and Device-agnostic Security for the Mobile Workforce

I’ve spent my entire career in technology and can still recall the time when a desktop PC was the only

  

Streaming Numbers Jump for European Football Tournament Delivered by Akamai

The video streaming traffic that Akamai delivered for more than 30 rights-holding customers during the July 11 Italy-England football (soccer)

  

Expanding Your Innovation Engine with Dell EMC PowerEdge Servers

New PowerEdge servers purpose-built for edge and telecom environments.Blog – Dell TechnologiesRead More

  

How To Clean Up Your Digital Footprint | Avast

Now that you’ve read our blog entry, “What is your digital footprint?”, you know everything you share and do online

  

Common WordPress Vulnerabilities and Prevention Through Secure Coding Best Practices

WordPress has experienced exponential growth in the past several years and now holds over 42% of the CMS market share

  

Mind the Gap: Securely Embracing the Digital Explosion

State and local governments are weathering a digital explosion. The move to "virtual everything" means that greater amounts of information

  

Firefox 90 introduces SmartBlock 2.0 for Private Browsing

Today, with the launch of Firefox 90, we are excited to announce a new version of SmartBlock, our advanced tracker

  

Zero Trust: The Protection Model for the Post-Pandemic World

One year and a half following the start of the COVID-19 pandemic, we’re seeing most companies either maintaining their remote

  

Crypto-Based Phishing Scams | Avast

Since the beginning of 2021, there’s been a rise in the prevalence of crypto-related phishing sites in certain parts of

  

Automotive Manufacturers Start Thinking Seriously About Cybersecurity

Cybersecurity threats for autonomous vehicles are rapidly evolving. Here’s what manufacturers can do to avoid them.Blog – Dell TechnologiesRead More

  

Cyber Academy – Viruses, Worms and Trojans Iframe

In this episode of “Cyber Academy” we will talk about viruses, worms and trojans. What is the difference between these

  

Don’t get tricked by this crashtastic iPhone Wi-Fi hack!

Learn how the trick works so that you can avoid it in case someone thinks it’s a joke to catch

  

12th July – Threat Intelligence Report

For the latest discoveries in cyber research for the week of 12th July, please download our Threat Intelligence Bulletin. Top

  

Scammers Poured Themselves a Glass and Got to Work on Wine-Themed Phishing Emails in 2020

Lots of people opened up bottles of wine on Zoom visits in isolation. And, 2020 saw rising wine sales and

  

Google FLoC | Avast

Earlier this year, Google announced a new way for advertisers to reach consumers without using cookies to track them individually

  

Firefox 90 supports Fetch Metadata Request Headers

  We are pleased to announce that Firefox 90 will support Fetch Metadata Request Headers which allows web applications to

  

Explaining STIX And TAXII Standards | Avast

For many years, cybersecurity companies have invested in building sensor networks and detection capabilities to build a greater understanding of

  

Where do all those cybercrime payments go?

Yes, the headline is a rhetorical question. But sometimes we get literal answers, and they’re well worth remembering.Naked SecurityRead More

  

Processing Machine Data With Machine Learning | Avast

This post was written by the following Avast researchers: Petr Somol, Avast Director AI Research Tomáš Pevný, Avast Principal AI

  

Kaseya And PrintNightmare Vulnerabilities | Avast

“It never rains but it pours.” It’s the saying that describes situations in which several bad things happen at once,

  

Twitter Considers New Security Features | Avast

Twitter People Experience Designer Lena Emara tweeted 4 new Twitter security feature concepts, asking users for feedback on whether or

  

Cisco Completes Acquisition of Socio Labs

More RSS Feed: newsroom.cisco.com/rss-feeds …The Network: Top StoriesRead More

  

Scale Databases Across Data Centers, Cloud and Edge

Dell Technologies, DataStax and Intel have created a solution for a cloud-native Apache Cassandra deployment built for the data growth

  

Akamai Helps Q-dance Bring Its Tribe to Defqon.1 at Home — a Global Virtual Festival Experience

Every year, Q-dance (part of the ID&T group), a Dutch electronic music experience company, delights its die-hard fans (or their

  

How Partnerships Help Agencies Accelerate Custom AI Deployments

Artificial intelligence (AI) and machine learning (ML) are poised to transform military and defense decision-making and operations.Blog – Dell TechnologiesRead

  

What Is Your Digital Footprint? | Avast

If you’re active online, you have a digital footprint. Everyone does. Every comment made on social media, every news article

  

Your Most Vulnerable Computer

Would you use a computer without any kind of antivirus? Would you put your personal photos on that device? Use

  

Sage Advice for Transforming IT in the Data Decade

Finishing the final mile of transformation is not easy. Modernizing IT infrastructure helps you increase agility, enhance service levels, reduce