Empower

Transform

Ignite

Amplify

Elevate

Innovate

Catalyze

Revolutionize

Enhance

Optimize

with

Pekan Designs – Web Design & Digital Marketing Agency | Digital Agency for Innovative Web and App Design

Empower

Transform

Ignite

Amplify

Elevate

Innovate

Catalyze

Revolutionize

Enhance

Optimize

with

Thousands of Sophos servers are vulnerable to this dangerous exploit

Cybersecurity researchers from VulnCheck have claimed thousands of internet-exposed servers running Sophos’ Firewall solution are vulnerable to a high-severity flaw that allows threat actors to remotely execute malware.  The company recently published a report in which it says that after running a quick Shodan scan, found more than 4,400 internet-exposed servers with Sophos Firewall vulnerable […]

Read More

Many businesses are set to spend big to raise their security game

IT leaders are worried about the security they currently have in place to defend against cyberattacks, but are willing to splash the cash to boost their protections, new research has claimed. The fourth annual Veeam Data Protection Trends Report surveyed over 4,000 IT leaders and those involved with implementing cybersecurity strategies at various organizations, finding that the […]

Read More

IBM says quantum computing could be a big risk to the future of encryption

A report from IBM has claimed quantum computing poses an “existential risk” to the current encryption protocols that secure our most sensitive data, like digital transactions. Protocols like public key cryptography (PKC) are said to be vulnerable “once quantum decryption solutions are viable”, which IBM calls the “harvest now, decrypt later” tactic. “Even if some […]

Read More

This dangerous malvertising campaign mimicks popular software to steal victim info

Cybersecurity researchers from HP Wolf Security have warned of several active campaigns looking to deliver different types of malware to unsuspecting victims via typosquatted domains and malvertising.  The team explained in a blog post how they found threat actors creating multiple typosquatted websites impersonating popular software such as Audacity, Blender, or GIMP.  The scammers also […]

Read More