All You Need to Know about the New WordPress Toolkit 3.5 [ VIDEO ]

1.    New Hotlink Protection Preventing other websites from displaying, linking or embedding your images (hotlinking), as this quickly drains your bandwidth and can make your site unavailable. 2.    Disable unused scripting languages This security measure removes support for the scripting languages WordPress doesn’t use, like Python and Perl. Thus, blocking Continue Reading

Digital Transformation in Healthcare and How Fabric Security Solutions Can Assist

Whether it’s healthcare, or any of the other 16 sectors of critical national infrastructure, enterprises responsible for some of our most important cyber assets are undergoing some sort of digital transformation. At its core, digital transformation in business is really about moving from intuitive to data-driven decision making to gain Continue Reading

Trends Affecting Managed Security Service Providers

Given the very public explosion of ransomware, and an ever-growing list of other cyber threats, IT services providers are increasingly looking for ways to meet the insatiable demand for cybersecurity. In this Q&A article with Jonathan Nguyen-Duy, we look at some of the trends and challenges facing the MSSP community. How Continue Reading

Introducing Argo — A faster, more reliable, more secure Internet for everyone

The Internet is inherently unreliable, a collection of networks connected to each other with fiber optics, copper, microwaves and trust. It’s a magical thing, but things on the Internet break all the time; cables get cut, bogus routes get advertised, routers crash. Most of the time, these failures are noticed Continue Reading

A Closer Look at the Rapid Evolution of EHR Security

More than any other database containing sensitive information for a large quantity of people, electronic health records (EHRs) are an especially attractive target for hackers. The patient data they hold can be used for financial gain, as recent reports show that stolen healthcare databases are being sold on the deep Continue Reading

Effectively Using Threat Intelligence

Yesterday, Fortinet and the other founding members of the Cyber Threat Alliance announced the establishment of the CTA as an independent organization. It’s an important, unified step forward in the global battle against cyber criminals. If we want to get ahead of cybercrime, we must share information. A collection of Continue Reading

Security Leads the Way for MSO Evolution to MSP

Like every other service provider segment, MSOs are looking for ways to leverage recent changes in technology and customer buying patterns in order to expand their addressable market and service offerings. MSOs now have an opportunity to claim a larger share of this growing business market by providing a new Continue Reading

cPanel TSR-2016-0005 Full Disclosure

cPanel TSR-2016-0005 Full Disclosure SEC-141 Summary Code execution as other accounts via mailman list archives. Security Rating cPanel has assigned this vulnerability a CVSSv2 score of 6.0 (AV:N/AC:M/Au:S/C:P/I:P/A:P) Description The sticky-group bit applied to mailman’s list archive directories allowed list owners to modify the contents of these directories. This could Continue Reading

Bayrob – An Ancient Evil Awakens

While ransomware has attracted much attention from security researchers lately, other malware hasn’t stopped. They are quietly seizing their own place in the attack market.  This article analyses one of them – “Bayrob”.  Our analysis is based on a new variant of Bayrob. We will discuss its background and describe Continue Reading