Arbor Spectrum is a high-performance network threat traffic analytics solution that detects and confirms previously hidden threats faster and more accurately than ever before. Arbor Spectrum 2.5 is now integrated with NETSCOUT’s ISNG platform with Adaptive Service Intelligence (ASI) technology to extract the high-resolution wire data security teams need to detect and investigate sophisticated security […]
Wannacry & Qualys As you will have read, Wannacry ransomware is taking advantage of systems which are missing Microsoft patch MS17-010 and/or Eternal flaws and propagates via SMB. Qualys’s detections for systems vulnerable are : 53007 IBM Lotus Domino Remote Code Execution – Shadow Brokers (EWORKFRENZY) – Zero Day 87284 Microsoft Internet Information Services 6.0 [...]
Cybersecurity: Queen opens centre to protect against attacks Read article
With the launch of Windows 10, anyone who walks into your house and gets your Wi-Fi password for their PC could potentially let all their friends onto your network, thanks to a new feature that has ignited controversy online. Called Wi-Fi Sense, the feature is designed to make it easier for people to get Internet […]
Donald Trump’s hotel business is investigating claims that it is the latest US firm to fall victim to a credit and debit card security breach. Security expert Brian Krebs reported that US banks had identified a pattern of fraudulent transactions involving accounts that had been used at a Trump Hotel Collection property. The attack appeared […]
A new spam campaign armed with the Dridexbanking malware is making its rounds and targeting company accountants with phony emails. Attached to each spam email is a fake scanned document that, in reality, is a macros-enabled .doc, Heimdal Security wrote in its blog post on the attack. The email tries to pass as legitimate under the […]
RSA released its inaugural Cybersecurity Poverty Index that compiled survey results from more than 400 security professionals across 61 countries. The survey allowed participants to self-assess the maturity of their cybersecurity programs leveraging the NIST Cybersecurity Framework (CSF) as the measuring stick. While larger organizations are typically thought of as having the resources to mount […]
The first EU Data Protection Directive was written in 1995 but a new, stronger regulation is being developed to take into account vast technology changes of the last 20 years. The plan is to finalise the regulation this year and implement it in 2017. As with any regulation, the current draft could change. However, only […]
The UK’s National Crime Agency has signed up two security firms to provide up-to-the minute intelligence about hi-tech crime. The deal will help it step up efforts to map cyber crime in Britain and the rest of the world. Intel Security and Trend Micro will be part of “virtual threat teams” who help take down […]
Nearly all critical infrastructure industry executives recognize that their organizations are targets for cybercriminals, and almost half think their systems could detect a cyber attack on a critical system within 24 hours. It’s not that the remaining executives think it could take day or weeks to detect a cyber attack; 61 percent think they could […]
The Blue Cube ethos is to offer fully independent and accurate advice providing the expertise, technology and management skills to help identify where to protect, what to protect and how to protect corporate IT resources and enable secure access for authorised users.
Blue Cube Security Ltd.
0345 094 3070
©2017 BLUE CUBE SECURITY LTD. ALL RIGHTS RESERVED.