Skip to content
Wednesday, October 04, 2023

TFun dot org

Information Security newsfeeds from around the world in English and French. Find it all in one place since 2004. You'll find online the last 5 years.

  • Security
  • Malware
  • Vulnerabilities
  • Hacking
  • cybercrime
  • Attack Maps
  • Privacy Policy
  • Live map

Author: Pat Cooper

Acronis Offers up to $5,000 to Users Who Spot Bugs in Its Cyber Protection Products

23/09/2021Pat Cooper

Once available only to the cybersecurity community, Acronis has opened its bug-hunting program to the public and aims to double the total bounties paid. Source: Threatpost.com

Continue Reading

Domain Brand Monitor: The First Brand Protection Layer by WhoisXML API

23/09/2021Pat Cooper

Domain names are often brands’ most valuable and impersonated assets. Learn how Brand Monitor by WhoisXML API supports brand protection. Source: Threatpost.com

Continue Reading

46% of On-Prem Databases Globally Contain Vulnerabilities: Is Yours Safe?

21/09/2021Pat Cooper

Are organizations neglecting the security of their data? An unprecedented five-year study reveals that internal databases are riddled with vulnerabilities – some even years old. Source: Threatpost.com

Continue Reading

Bring Your APIs Out of the Shadows to Protect Your Business

20/09/2021Pat Cooper

APIs are immensely more complex to secure. Shadow APIs—those unknown or forgotten API endpoints that escape the attention and protection of IT¬—present a real risk to your business. Learn how to identify shadow APIs and take control of them before attackers do. Source: Threatpost.com

Continue Reading

5 Steps For Securing Your Remote Work Space

10/09/2021Pat Cooper

With so many people still working from home, cybercriminals are trying to cash in. Cyberattacks have increased 300% and the risk of losing important data or being compromised is much greater at home. Here are five recommendations for securing your home office. Source: Threatpost.com

Continue Reading

Top Strategies That Define the Success of a Modern Vulnerability Management Program

27/08/2021Pat Cooper

Modern vulnerability management programs require a strategy that defines what success means for your organization’s cybersecurity goals. By incorporating a few simple cyber hygiene routines to your daily security routine, you’ll set up your IT teams to be better equipped to steer off cyberattacks. Source: Threatpost.com

Continue Reading

How to Reduce Exchange Server Downtime in Case of a Disaster?

17/08/2021Pat Cooper

Exchange downtime can have serious implications on businesses. Thus, it’s important to maintain backups and implement best practices for Exchange servers that can help restore the Exchange server when a disaster strikes with minimal impact and downtime. Source: Threatpost.com

Continue Reading

Cyber Polygon 2021: Towards Secure Development of Digital Ecosystems

10/07/2021Pat Cooper

Cybersecurity is one of the most important topics on the global agenda, boosted by the pandemic. As the global digitalisation is further accelerating, the world is becoming ever more interconnected. Digital ecosystems are being created all around us: countries, corporations and individuals are taking advantage of the rapid spread of the Internet and smart devices. […]

Continue Reading

5 Tips to Prevent and Mitigate Ransomware Attacks

16/06/2021Pat Cooper

Ransomware attacks are increasing in frequency, and the repercussions are growing more severe than ever. Here are 5 ways to prevent your company from becoming the next headline. Source: Threatpost.com

Continue Reading

How Mobile Ad Fraud has Evolved in the Year of the Pandemic

01/06/2021Pat Cooper

Mobile ad fraud has always been a challenge for network operators in all parts of the globe, but the pandemic has made users more vulnerable than ever before due to the sheer amount of time they now spend with their devices. Source: Threatpost.com

Continue Reading

Posts navigation

Older posts
Tfun News | Theme: News Headline by CodeVibrant.
  • Security
  • Malware
  • Vulnerabilities
  • Hacking
  • cybercrime
  • Attack Maps
  • Privacy Policy
  • Live map