Remove tag location-based-services
article thumbnail

Stark Industries Solutions: An Iron Hammer in the Cloud

Krebs on Security

Two weeks before Russia invaded Ukraine in February 2022, a large, mysterious new Internet hosting firm called Stark Industries Solutions materialized and quickly became the epicenter of massive distributed denial-of-service (DDoS) attacks on government and commercial targets in Ukraine and Europe.

Cloud 274
article thumbnail

U.S. Govt. Apps Bundled Russian Code With Ties to Mobile Malware Developer

Krebs on Security

Army and the Centers for Disease Control and Prevention (CDC) were integrating software that sends visitor data to a Russian company called Pushwoosh , which claims to be based in the United States. But a recent investigation by Reuters raised questions about the company’s real location and truthfulness.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Managed IT Service Providers (MSPs): A Fast Way to Secure IT

eSecurity Planet

Managed service providers, also known as MSPs, offer organizations of all sizes a way to gain fractional expertise and capabilities unrelated to their core activities without the need for a huge upfront investment. This article will explore what MSPs are through the following topics: How Do MSPs Work? What Are the Types of MSPs?

IT 98
article thumbnail

Managed IT Service Providers (MSPs): A Fast Way to Secure IT

eSecurity Planet

Managed service providers, also known as MSPs, offer organizations of all sizes a way to gain fractional expertise and capabilities unrelated to their core activities without the need for a huge upfront investment. This article will explore what MSPs are through the following topics: How Do MSPs Work? What Are the Types of MSPs?

IT 97
article thumbnail

Cisco Identity Services Engine (ISE): NAC Product Review

eSecurity Planet

Cisco Identity Services Engine (ISE) expands upon a basic Network Access Control (NAC) concept to include modules for network device control and integrated security options. This article will provide an overview of features, pros, cons, certifications, and pricing to help understand ISE in more detail. Who is Cisco?

MDM 98
article thumbnail

Top IoT Security Solutions of 2021

eSecurity Planet

This article looks at the top IoT security solutions, current commercial features, associated risks, and considerations for organizations choosing an IoT vendor. With Armis Standard Query (ASQ), operators can search and investigate vulnerabilities, services, and policies for managed and unmanaged devices, applications, and networks.

IoT 140
article thumbnail

Top Cybersecurity Products for 2021

eSecurity Planet

In this article, we’ll cover some of the most important tools to have in your security arsenal and some of the best vendors in each category. CrowdStrike Falcon is a powerful EDR tool for response, cloud-based management, ease of use and support. A number of solutions may be needed to protect against all of these threats.