• Home
  • News
  • Big Data & Analytics
  • DevOps
  • Security
  • GDPR
  • AI & ML
  • Women in Tech
  • Cloud & Infrastructure
  • CIO
  • Deskflix
  • Events
  • Whitepapers
  • Spotlights
  • IT Leaders 250
  • Research
  • Delta
  • Tech Marketing Hub
  • About Us
  • Newsletters
  • Sign in
  •  
      • Newsletters
      • Account details
      • Contact support
      • Sign out
     
     
    • You are currently accessing Computing via your Enterprise account.

      If you already have an account please use the link below to sign in.

      If you have any problems with your access or would like to request an individual access account please contact our customer service team.

      Phone: +44 (0) 1858 438800

      Email: customerservices@incisivemedia.com

      • Sign in
     
  • Follow us
    • Twitter
    • LinkedIn
    • Newsletters
    • Facebook
    • YouTube
  • Register
  • Events
    • Upcoming events
      event logo
      Where the buck stops: Why a shared responsibility model will help you own your cloud security flaws

      This webinar, and accompanying dedicated research, will reveal to what extent organisations are practicing a shared responsibility model for cloud security today and the degree to which IT leaders are aware of what they should be doing to ensure the secure use of their multi- and hybrid-cloud environments.

      • Date: 27 Jan 2021
      event logo
      Leveraging the Cloud to Defeat Data Disasters

      Join us and learn how your IT team can realize many of the powerful advantages of the cloud and solve the operational complexity behind managing data across hybrid and multi-cloud IT environments with centralized management, automation, end-to-end security, and lower TCO.

      • Date: 28 Jan 2021
      event logo
      Deskflix Hybrid and Multi Cloud

      One of the most powerful tools for breaking down silos and integrating resources is cloud computing. But multi-tenancy cloud is not the ideal environment for every application or every class of data and some will need to remain on-prem for the foreseeable future; nor are all clouds equal. Tune in to Deskflix season 1 to hear industry experts speak on the questions you need answered on hybrid and multi cloud.

      • Date: 10 Feb 2021
      event logo
      Deskflix Financial Services

      oin us for this episode of Deskflix to hear from industry experts and peers on their 2020 best practices, what they’ve learnt for 2021 and how they plan to overcome the next wave of disruption.

      • Date: 03 Mar 2021
      View all events
  • Whitepapers
    • LATEST WHITEPAPERS
      Darktrace 120x194
      Cyber AI Response: Threat Report 2019

      This white paper details 7 case studies of attacks that were intercepted and neutralised by Darktrace cyber defense AI, including a zero-day trojan in a manufacturing company's network. Learn how Darktrace Antigena AI Response modules fight back autonomously, no matter where a threat may emerge, extending to the Cloud, Email and SaaS.

      Download
      Darktrace 120x194
      Cyber AI & Darktrace Cloud

      This white paper explores how cloud is a security blind spot for many organisations who struggle with the limited visibility and control in this new environment, where their existing security tools are often not applicable.

      Download
      Find whitepapers
      Search by title or subject area
      View all whitepapers
  • Spotlights
    • Spotlights

      Welcome to Computing's Spotlight section, where we focus in on particularly important themes and topics of enterprise IT.

      Intel logo

       

      Endpoint Management and Security Hub

  • IT Leaders 250
  • Research
  • Delta
  • Tech Marketing Hub
  • About Us
Computing
Computing
  • Home
  • News
  • Big Data & Analytics
  • DevOps
  • Security
  • GDPR
  • AI & ML
  • Women in Tech
  • Cloud & Infrastructure
  • CIO
  • Deskflix
 
    • Newsletters
    • Account details
    • Contact support
    • Sign out
 
 
  • You are currently accessing Computing via your Enterprise account.

    If you already have an account please use the link below to sign in.

    If you have any problems with your access or would like to request an individual access account please contact our customer service team.

    Phone: +44 (0) 1858 438800

    Email: customerservices@incisivemedia.com

    • Sign in
 

NSA

US intelligence confirms actor 'likely Russian in origin' behind the SolarWinds hacking campaign
US intelligence confirms actor 'likely Russian in origin' behind the SolarWinds hacking campaign

The operation appears to be an intelligence gathering effort, rather than an act of cyber warfare, agencies say

  • Hacking
  • 06 January 2021
NSA: Russian hackers are targeting a VMware vulnerability to steal data
NSA: Russian hackers are targeting a VMware vulnerability to steal data

The bug could allow attackers to forge SAML credentials to access protected data

  • Hacking
  • 08 December 2020
VMware rolls out security updates to address zero-day bug
VMware rolls out security updates to address zero-day bug

The bug could enable an attacker to take control of a vulnerable machine running VMware Workspace One Access and other software

  • Threats and Risks
  • 07 December 2020
NSA details top 25 vulnerabilities to patch immediately
NSA details top 25 vulnerabilities to patch immediately

The NSA says Chinese state-sponsored hackers are actively exploiting these bugs in the wild

  • Threats and Risks
  • 21 October 2020
NSA and FBI expose Russian 'Drovorub' malware used to target Linux systems
NSA and FBI expose Russian 'Drovorub' malware used to target Linux systems

The malware is being deployed in real-world attacks by hackers working for Russian military intelligence unit, they state

  • Threats and Risks
  • 14 August 2020
NSA pilots secure DNS model to protect against malware attacks
NSA pilots secure DNS model to protect against malware attacks

System will be rolled out to US defence contractors

  • Security Technology
  • 19 June 2020
Hackers linked with Russian military intelligence are exploiting Exim mail transfer agent bug to target US organisations, NSA warns
Hackers linked with Russian military intelligence are exploiting Exim mail transfer agent bug to target US organisations, NSA warns

The particular group is referred to as "Sandworm" in cyber security community

  • Hacking
  • 29 May 2020
NSA, ASD publish advisory for detecting and mitigating web shell malware
NSA, ASD publish advisory for detecting and mitigating web shell malware

Malicious web shells can evade detection from most security tools, so they are difficult to detect

  • Threats and Risks
  • 24 April 2020
CIA was behind 11-year cyber campaign against China, claims Qihoo 360
CIA was behind 11-year cyber campaign against China, claims Qihoo 360

China’s Qihoo-360 names former CIA intelligence officer it claims was behind China cyber attacks, linking him to Vault 7 trove of attack tools

  • Security
  • 03 March 2020
Microsoft releases patch for Windows crypto vulnerability disclosed by the NSA
Microsoft releases patch for Windows crypto vulnerability disclosed by the NSA

Serious Windows security flaw affects the Windows CryptoAPI module, which provides services for encrypting and decrypting data

  • Security
  • 15 January 2020
'DarkUniverse' APT referenced in 2017 Shadow Brokers leak uncovered by Kaspersky
'DarkUniverse' APT referenced in 2017 Shadow Brokers leak uncovered by Kaspersky

DarkUniverse developed its full-featured malware from scratch but went quiet shortly after the Shadow Brokers leak

  • Security
  • 06 November 2019
Tiny $2 spy chip can be added to IT hardware, claims security researcher Monta Elkins
Tiny $2 spy chip can be added to IT hardware, claims security researcher Monta Elkins

Bloomberg has been widely derided for its Supermicro spy-chip story, but Elkins claims it's feasible and low cost

  • Security
  • 14 October 2019
China's APT10 hacking group suspected of cyber attacks against Airbus suppliers
China's APT10 hacking group suspected of cyber attacks against Airbus suppliers

Four major attacks on Airbus's supply chain have been detected in the past 12 months

  • Hacking
  • 27 September 2019
US government sues Edward Snowden over autobiography claiming it breaks NDAs
US government sues Edward Snowden over autobiography claiming it breaks NDAs

Legal action will relieve Snowden of any US royalties he'll earn from his autobiography

  • Security
  • 18 September 2019
China-linked APT3 group developed NSA-style hacking tools by observing their network traffic
China-linked APT3 group developed NSA-style hacking tools by observing their network traffic

APT3 used NSA-linked exploit tools before 'Shadow Brokers' leaks in 2016 and 2017

  • Security
  • 06 September 2019
NSA to build new features into its open-source malware analysis tool Ghidra
NSA to build new features into its open-source malware analysis tool Ghidra

New enhancements will improve accuracy, claims NSA

  • Security
  • 09 August 2019
Russian search giant Yandex hacked by Western intelligence agencies to spy on developers
Russian search giant Yandex hacked by Western intelligence agencies to spy on developers

Yandex hack occurred between October and November 2018 when Regin malware associated with the NSA was found

  • Security
  • 28 June 2019
Chinese hackers repurposed captured NSA hacking tools to carry out cyber attacks in 2016
Chinese hackers repurposed captured NSA hacking tools to carry out cyber attacks in 2016

Symantec says group linked with China's Ministry of State Security acquired NSA tools months before they were leaked by Shadow Brokers

  • Security
  • 07 May 2019
Ex-NSA staffer jailed for taking malware work home - where it was detected by his Kaspersky anti-virus software
Ex-NSA staffer jailed for taking malware work home - where it was detected by his Kaspersky anti-virus software

Five-and-a-half years for Nghia Hoang Pho for taking top-secret NSA malware home

  • Security
  • 27 September 2018
Wikileaks 'Vault 7' leak suspect named - but charged with harbouring images of child abuse
Wikileaks 'Vault 7' leak suspect named - but charged with harbouring images of child abuse

Former CIA and NSA staffer Joshua Schulte cited as suspect in Vault 7 leak of US secret services' hacking tools to Wikileaks

  • Cloud and Infrastructure
  • 16 May 2018
NSA's Microsoft SMB protocol exploit EternalBlue returns with WannaMine cryptocurrency-jacking malware
NSA's Microsoft SMB protocol exploit EternalBlue returns with WannaMine cryptocurrency-jacking malware

If you haven't patched against EternalBlue yet, you probably deserve to be crypto-jacked

  • Security
  • 02 February 2018
Patching isn't working and end-users ignore breaches, says ex-NSA security VP David Venable
Patching isn't working and end-users ignore breaches, says ex-NSA security VP David Venable

Vendors need to be liable when their software is breached, says David Venable

  • Threats and Risks
  • 30 January 2018
NSA accidentally leaks more secrets after 'Red Disk' was left on unsecured AWS server
NSA accidentally leaks more secrets after 'Red Disk' was left on unsecured AWS server

Who needs Edward Snowden when the NSA is so careless with its own data?

  • Security
  • 30 November 2017
Kaspersky NSA hacking report suggests contractor's PC was riddled with malware
Kaspersky NSA hacking report suggests contractor's PC was riddled with malware

Kaspersky identified more than 120 different types of malware on NSA contractor's PC

  • Privacy
  • 17 November 2017
123

Most read

New SolarWinds hack victims emerging every day, as Malwarebytes goes public on breach
New SolarWinds hack victims emerging every day, as Malwarebytes goes public on breach
Women in IT: don't get stuck in 'glue work' if you want to get on
Women in IT: don't get stuck in 'glue work' if you want to get on
Russian malware found on government-issued laptops for home schooling
Russian malware found on government-issued laptops for home schooling
Google locks out another top AI ethicist
Google locks out another top AI ethicist
BT faces possible £500m claim for overcharging landline-only customers
BT faces possible £500m claim for overcharging landline-only customers
  • Contact
  • Delta
  • Marketing solutions
  • Enterprise IT Events
  • Incisive Media
  • Terms & conditions
  • Policies
  • Careers
  • Twitter
  • LinkedIn
  • Newsletters
  • Facebook
  • YouTube

im_logo

© Incisive Business Media (IP) Limited, Published by Incisive Business Media Limited, New London House, 172 Drury Lane, London WC2B 5QR, registered in England and Wales with company registration numbers 09177174 & 09178013

Digital publisher of the year
Digital publisher of the year 2010, 2013, 2016 & 2017
Loading