Ericsson, Oppo and Qualcomm successfully test 5G business networks division

Ericsson, Oppo and Qualcomm successfully test 5G business networks division

Swedish telecommunications equipment company Ericsson has successfully tested its 5G network split on an Oppo phone with a Snapdragon 8 Gen 1 chipset running on Android 12. The test used Ericsson’s Dynamic Network Slicing Selection and its 5G RAN slicing, which delivered the network capabilities required for this new solution in oppo 5G communications laboratory. … Read more

How technology and transformation are bridging the Ts in OTT

How technology and transformation are bridging the Ts in OTT

GUEST REVIEW: Digital transformation has impacted virtually every industry, and the entertainment industry is no exception to this category. Over the past decade, the way people consume entertainment has been completely transformed. The OTT market continues to witness a shift in the way users consume and interact with content, with the pandemic further accelerating its … Read more

Technologists define key focus areas for full observability and recognize the need for a holistic approach

Technologists define key focus areas for full observability and recognize the need for a holistic approach

INVITED RESEARCH Technologists across industries have recognized the urgent need to leverage their current application monitoring tools and techniques to deal with the heightened levels of complexity they now face in every corner of their IT estate. They are looking to bring together disconnected tools to gain a unified view of IT performance and availability … Read more

How does cybersecurity help prevent internet crimes?

How does cybersecurity help prevent internet crimes?

PARTNER CONTENT: Global cybersecurity damage is expected to cost up to $10.5 trillion annually by 2025, at a 15% annual growth rate. It means that cyber crimes are increasing at an alarming rate. So, each and every organization has set its sights on the cybersecurity horizon. Believe it or not, cyber security is the only … Read more

Microsoft finds major security flaws in pre-installed Android apps

Microsoft finds major security flaws in pre-installed Android apps

Microsoft bug hunters are drawing attention to several high-severity vulnerabilities in a mobile framework used in pre-installed Android system apps, warning that the exploit could have allowed a persistent backdoor to be implanted on Android devices. According to an advisory published Friday by the Microsoft 365 Defender research team, a total of four documented vulnerabilities … Read more

Massive Increase in Linux XorDDos Malware Usage Reported

Massive Increase in Linux XorDDos Malware Usage Reported

Cybercrime, DDoS Protection, Fraud and Cybercrime Management Microsoft: XorDDos is known for using Secure Shell brute force attacks Prajeet Nair (@prajeetspeaks) • May 21, 2022 XorDDos is part of the malware trend that is increasingly targeting Linux (Source: ISMG) Microsoft has seen a 254% increase in activity over the past six months for XorDDos, a … Read more

How Linux became the new target for bad guys

How Linux became the new target for bad guys

Organizations need to secure, monitor and manage Linux like any other endpoint on the network Historically, cybercriminals have not paid much attention to Linux systems. In fact, Linux was once one of the least attacked platforms in IT, but that changed quickly. Today we see malware designed to attack Linux systems, often in executable and … Read more

Cryptomining botnet targeting Docker on Linux systems

Cryptomining botnet targeting Docker on Linux systems

Credit: Dreamtime LemonDuck, a well-known crypto miner botnettargets Docker on Linux systems to mint digital money, CloudStrike reported. The vendor’s threat research team revealed in a blog written by Manoj Ahuje that the botnet is leveraging Internet-exposed Docker APIs to run malicious containers on Linux systems. Docker is used to build, run, and manage containerized … Read more

LemonDuck Malware Becomes Major Crypto Mining Botnet

LemonDuck Malware Becomes Major Crypto Mining Botnet

Cybercrime, Cybercrime as a Service, Fraud Management and Cybercrime New campaign targets Docker to mine crypto on Linux systems Brian Pereira • April 22, 2022 LemonDuck disguises its activity through the use of proxy groups. (Source: ISMG) LemonDuck, once a small piece of crypto mining malware, has grown in the last two years into a … Read more

Sophos Unveils Linux Cloud Protection Advances and Deals

Sophos Unveils Linux Cloud Protection Advances and Deals

Sophos has unveiled advances in Sophos Cloud Workload Protection, including new Linux host and container security capabilities. The enhancements speed detection and response to ongoing attacks and security incidents within Linux operating systems, improve security operations, and bolster application performance. According to new research from SophosLabs, distributed denial-of-service (DDoS) tools, cryptocurrency miners, and various types … Read more