John P. Mello Jr.

Contributor

John Mello writes on technology and cyber security for a number of online publications and is former managing editor of the Boston Business Journal and Boston Phoenix. Disclosure: He also writes for Hewlett-Packad's marketing website TechBeacon.

New Linux-based ransomware targets VMware servers

Enterprises report rise in risk events, yet risk management lags

Enterprises report rise in risk events, yet risk management lags

More threats to data, privacy are the top concerns of risk managers and are becoming “the new normal.”

CISOs worried about material attacks, boardroom backing

CISOs worried about material attacks, boardroom backing

CISOs are also less concerned about ransomware attacks, but many says their organizations are still not properly prepared for them.

Threat hunters expose novel IceApple attack framework

Threat hunters expose novel IceApple attack framework

Suspected state-sponsored threat actor uses IceApple to target technology, academic and government sectors with deceptive software.

Microsoft expands managed security services offerings with new program

Microsoft expands managed security services offerings with new program

Security Experts allows customers to tap into Microsoft pros for threat hunting, XDR, and modernization.

Wrongly configured Google Cloud API potentially creates dangerous functionality

Wrongly configured Google Cloud API potentially creates dangerous functionality

Misconfiguration of the Google Cloud Platform API could create an exploitable behavior that leads to service compromise.

New attack surface management product takes full-stack aim at software supply chain threats

New attack surface management product takes full-stack aim at software supply chain threats

Data Theorem's Supply Chain Secure offers continuous runtime analysis and dynamic inventory discovery.

Firms struggling with non-person identities in the cloud

Firms struggling with non-person identities in the cloud

Enterprises turning to cloud identity governance, cloud infrastructure entitlements management. and AI-driven investigation, behavioral detection programs to treat cloud security ailments.

Jamf beefs up enterprise security software for Mac

Jamf beefs up enterprise security software for Mac

Network threat prevention, muscular analytics, and BYOD management are among new features offered in app suite.

Cryptomining botnet targeting Docker on Linux systems

Cryptomining botnet targeting Docker on Linux systems

LemonDuck crew deploy deceptive tactics to evade detection and anonymize mining operations.

Fragmented tool landscape biggest cybersecurity challenge to medical device makers

Fragmented tool landscape biggest cybersecurity challenge to medical device makers

Continuous monitoring of security throughout the medical device product lifecycle also poses problems.

Vicarius releases free Nmap scanning tool

Vicarius releases free Nmap scanning tool

The company claims that Nmap Scan Analysis will provide an easy-to-use visualization of Nmap scan data.

Load More