Image sourced from Australian Reseller News. Sophos, a global leader in next-generation cybersecurity, today unveiled new advancements to Sophos Cloud Workload Protection, including new Linux host and container security capabilities. These enhancements accelerate the detection and response of in-progress attacks and security incidents within Linux operating systems, improve security operations and bolster application performance. According to new SophosLabs research, distributed denial-of-service (DDoS) tools, cryptocurrency miners and various types of backdoors were the top three types of Linux threats detected by Sophos in a dataset from January through March 2022. DDoS tools accounted for nearly half of all Linux malware detections during this time, likely due to automate...
We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit “Cookie Settings” to provide a controlled consent.
According to a report released by Ireland-based multinational professional services company Accenture, a low investment in cyber security, and immature cybercrime legislation, makes South Africa a target for cybercrime, with the country registering the third-highest number of cybercrime victims worldwide. In addition, as with other countries, the cybersecurity skills shortage is hindering the ability of businesses to effectively manage and stay ahead of constantly-evolving cyberthreats. The lack of skills means businesses find themselves on the back foot, looking for individuals who are able to manage and run solutions, manage incident and security teams, and having to ensure the implementation of a strong security posture. This is not isolated to a single partner or end-user o...
We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit “Cookie Settings” to provide a controlled consent.
We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit “Cookie Settings” to provide a controlled consent.
We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit “Cookie Settings” to provide a controlled consent.
We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit “Cookie Settings” to provide a controlled consent.