Edgescan Press & Media

Links to Edgescan in press & media

Download Press Kit

 

For speaker and media requests contact media@edgescan.com

2020

 

SC Magazine | Hackers spotting exposed Elasticsearch servers faster than search engines
SC Magazine | ‘Dangerous to speculate’ over state-based cyber-attack on Australia without evidence and threat intelligence
Teiss | Twitter says business users’ data leaked in security fiasco
Infosecurity Magazine | Twitter Data Leak Exposes Business Clients

SC Magazine | Fears over ‘worrying’ Twitter breach as personal details are compromised
Compliance Week | "Ireland’s GDPR report shows it’s yet to hold Big Tech accountable
Teiss | Australian PM warns of widespread state-sponsored cyber attacks
SC Magazine | Criminals develop DDoS protection to stay online when rivals or law enforcement attack
Teiss | Unsecured databases targeted at least 18 times every day by hackers
IT Security Guru | Unsecured Internet-facing database attracts hackers in a matter of hours
SC Magazine|  SC Awards Europe 2020 - Best Enterprise Security Solution
SC Magazine | SC Awards Europe 2020 - Best Vulnerability Management Solution
National Cyber Security | FBI and CISA reveal top ten vulnerabilities exploited by hackers | #exploits | #vulnverabilities
IT Security Guru | Verizon DBiR - Edgescan explains the stats
IT Security Guru  | Cybersecurity Experts Comment on Phishing Campaign That Can Bypass MFA
Techspective | 4 Dos and 4 Don’ts of B2B Portal Security

RTE.ie | BGF invests €10.5m to buy minority stake in Edgescan

Independant.ie | Dublin-based cybersecurity firm Edgescan receives €10.5m investment

ThinkBusiness | Dublin SaaS player Edgescan raises €10.5m

Silicon Republic | Dublin cybersecurity firm Edgescan raises €10.5m

The Irish Times | BGF invests €10.5m in Dublin cybersecurity company

SC Magazine | "Verizon report analysis: Money not espionage at the heart of cyber-crime breaches"
Information Security Buzz | Expert On AnarchyGrabber Trojan Update Stealing Discord Clients Passwords

CybercureME | "Microsoft OLE Bugs Most Frequently Exploited Since 2016"
National Cyber Security | #microsoft | #microsoftsecurity | Microsoft OLE Bugs Most Frequently Exploited Since 2016 – | #cybersecurity | #informationsecurity
Infosecurity Magazine | Microsoft OLE Bugs Most Frequently Exploited Since 2016
TEISS | FBI and CISA reveal top ten vulnerabilities exploited by state-sponsored hackers
SC Magazine | PerSwaysion spear-phishing campaign tricks users to get 365 log-in credentials
TEISS | Rise in brute-force attacks on remote desktop accounts amid COVID-19 crisis

SC Magazine | Hackers could manipulate Azure agent, using skeleton key to attack cloud infrastructure
SC Magazine | UK plans its own Covid contact tracing app
SC Magazine | Bugs in HP Support Assistant could lead to remote code execution attacks

ITPROPortal | "Safari bug let hackers access cameras on iPhones and Macs"
ITSP | Edgescan And Richey May Join Forces
SC Magazine | New campaign to hack MS-SQL servers uncovered

IT Security Guru | Is SaaS the future of cybersecurity?

SC Magazine UK | Simply the best - SC Awards Europe finalists announced
Tech TImes | This Map Explains How Intensive Use of the Internet and Gaming During Coronavirus Lockdowns Affect Broadband Infrastructure
Big World Tale | Pressure map shows coronavirus stress on internet infrastructure
Daily Mail | Global 'internet pressure' map reveals how rolling lockdowns due to coronavirus are putting stress on broadband infrastructure as people around the world turn to HD streaming and online gaming for entertainment
Digital Munition | Why managed security services are a no-brainer
Sunday TImes / Raconteur | Why managed security services are a no-brainer

Forbes | Intel CPU Security Alert For Millions Of Users As ‘Unfixable’ Crypto Flaw Revealed

The Sun | GOOG-BYE! It’s IMPOSSIBLE for Google to stop your Android phone being hacked if you don’t upgrade, experts warn
The Scottish Sun | GOOG-BYE! It’s IMPOSSIBLE for Google to stop your Android phone being hacked if you don’t upgrade, experts warn
FNTalk | GOOG-BYE! It’s IMPOSSIBLE for Google to stop your Android phone being hacked if you don’t upgrade, experts warn
SC Magazine | Google's Project Zero changes disclosure policy; Infosec community debates the need
The U.S. Sun | GOOG-BYE! It’s IMPOSSIBLE for Google to stop your Android phone being hacked if you don’t upgrade, experts warn
SC Magazine | WordPress plugin vulnerability enables hackers inject malicious code
GDPR Report | #Privacy: Organisations take over 50 days to resolve critical risk vulnerabilities for web-facing apps

The U.S. Sun | ALEXA, GOODBYE Only way to stop Amazon Alexa recording you at home is to BIN it, experts warn
The Sun | ALEXA, GOODBYE Only way to stop Amazon Alexa recording you at home is to BIN it, experts warn
SC Magazine | Failure to sign firmware updates put Windows and Linux devices at risk
ITSP Magazine | Edgescan Helps Aon Clients Stay Cyber Secure
Business Computing World | Edgescan Helps Aon Clients Stay Cyber Secure
Digital Journal | Edgescan Helps Aon Clients Stay Cyber Secure
Digital Forensics Magazine | Millions of Windows and Linux systems vulnerable to cyber-attack- Comment
SC Magazine UK | The hidden cancer in your network

SC Magazine UK | Millions of Dell business PCs hit by troubleshooting bug

Forbes | Apple Security Surprise As Mac Threats Outpace Microsoft Windows By 2 To 1
Forbes | WhatsApp Security Warning For iPhone Users As One-Click Attack Risk Confirmed
SC Magazine UK | Flaws in WhatsApp could expose users to malicious links
Computer Weekly | Security Think Tank: Facing the challenge of zero trust

SC Magazine UK | Enterprises ill-prepared for memory lane attacks despite defences

The Sun UK | APPLE CRUMBLE: Which iPhones are ‘obsolete’ and ‘dangerous’ in 2020? The full list

The Scottish Sun | APPLE CRUMBLE: Which iPhones are ‘obsolete’ and ‘dangerous’ in 2020? The full list
Irish Sun | APPLE CRUMBLE: Which iPhones are ‘obsolete’ and ‘dangerous’ in 2020? The full list
FNTalk.com | Which iPhones are 'obsolete' and 'dangerous' in 2020? The full list
Digital Information World | Using Old iOS and Android phones can get your data hacked
The Charles Tendell Show | S2E1 - Lord Bezos Got Hacked - The Eoin Keary Interview
IT Security Guru  | Is SMS Two-Factor Authentication Secure?
DigitalMunition | Is SMS Two-Factor Authentication Secure?
The Sun | POCKET PANIC: Why it’s dangerous to keep using your very old iPhone, Samsung or Android mobile
The Scottish Sun | POCKET PANIC: Why it’s dangerous to keep using your very old iPhone, Samsung or Android mobile
FNTalk.com | Why it's dangerous to keep using your very old iPhone, Samsung or Android mobile
The Times | Fianna Fail to reprogram the military for cyber-security

DigitalMunition | CVE-2020-0601, Are You Vulnerable?
IT Security Guru | CVE-2020-0601, Are You Vulnerable?
SC Magazine UK | Don't Panic! Critical flaw affects all versions of Windows - patch today
ThinkBusiness.ie | 20 Irish SaaS Players Bursting in the Cloud in 2020
SC Magazine UK | Google's Project Zero changes disclosure policy; Infosec community debates the need
SC Magazine UK | Thousands of businesses at risk via Pulse Secure VPN flaw (updated with response)
SC Magazine UK | Clop ransomware evolves as app-killing malware for Windows 10

 

 

 

2019

Infosecurity Magazine | Driving Tech Education in Foreign Lands

SC Magazine UK | 44 million Azure AD/Microsoft accounts compromised; password problems highlighted

Forbes | Microsoft Security: Password Problem Affecting 44 Million Users Revealed

IT Security Guru | Microsoft Research Team finds Password Reuse Rampant

Euro Gamer | Microsoft e il problema della sicurezza: 44 milioni di utenti riutilizzano le stesse password

Republic World | Around 44 Mn Microsoft Accounts Found Using Breached User Names, Passwords

Business Mayor | Microsoft Security: Password Problem Affecting 44 Million Users Revealed – Forbes

DIGITAL Munition | Microsoft Research Team finds Password Reuse Rampant

SC Magazine | Sophistication of phishing scams demonstrated by Steam gamer account attack

Information Security Buzz | Security Expert On Facebook Announces Innovation In Data Portability With A New Photo Transfer Tool

SC Magazine UK | Information of 1.2 billion people uncovered in massive data leak

TEISS | Phoenix: the £11.6 keylogger that can evade 80 anti-malware products

IT Pro | Google confirms Android cameras can be hijacked to spy on you

TEISS | No more security patches for Acrobat 2015 and Adobe Reader 2015 from April

The Irish Sun | Android bug lets hackers SPY through your camera – and over 100million Samsung and Google owners ‘affected’

The Scottish Sun | Android bug lets hackers SPY through your camera – and over 100million Samsung and Google owners ‘affected’

The Sun | Android bug lets hackers SPY through your camera – and over 100million Samsung and Google owners ‘affected’

Tech Bites - Daily Digest | Application Security Report: Urgent Need for Remediation

SC Magazine UK | Android camera bug lets attackers take pictures, track calls

FNTalk | Android bug lets hackers SPY through your camera – and over 100million Samsung and Google owners 'affected'

Daily Sun Post | Google and Samsung phones can be HACKED to spy on you through camera

The News AmEd | Android bug lets hackers SPY through your camera – and over 100million Samsung and Google owners ‘affected’

Information Security Buzz | Experts Comments On New 5G Flaws Can Track Phone Locations And Spoof Emergency Alerts

IT Security Guru | Labour Party Hack: What Do Experts Think?

SC Magazine | How you might be installing malware on your own WordPress sites

ComputerWeekly | Making the case for integrated risk management

IT Security Guru | Q&A with Eoin Keary

Verdict | Twitter bans political ads

Forbes | The World’s First Internet Domain Name Provider Confirms Data Breach

Information Security Buzz | Experts Insight On Adwind jRAT Variant

Information Security Buzz | Experts On Yet Another Warning For Android Users

ITProPortal | Don't waste crucial security budget

Information Security Buzz | Attackers Exploit 0-Day Vulnerability That Gives Full Control Of Android Phones

Computing | Security Excellence Awards shortlist recognises success

SC Magazine UK | Sophisticated tools provide false sense of cyber-security: Survey

SC Magazine UK | Enterprise ransomware threat shines spotlight on poor patch management

SC Magazine UK | Healthcare leads in cost of data breaches

Microscope | What makes a great managed security service provider?

The Times | Irish government admits ransomware breach

Computing | Vote now to choose the winners of the Technology Product Awards 2019

SC Magazine | Instagram vulnerability exposed user data; Patch issued after alert

SC Magazine | Potential 'Mirai-style botnet' could be created via Telestar Digital Radio vulnerabilities

newsllive | Over 419m phone numbers of Facebook users found in web server

ThreatPost | News Wrap: Deepfake CEO Voice Scam, Facebook Phone Data Exposed

Information Security Buzz | Massive database of Facebook users ids and phone numbers found online on unprotected server

City A.M | Huge Facebook data leak exposes phone numbers of 419m users

EGR Technology | Just another third-party application

ThreatPost | How to Get a Handle on Patch Management

Information Security Buzz | Microsoft Warns Of New BlueKeep‑like Flaws

Intelligent CISO | Edgescan research reveals time spent validating false positives

Microscope | Cyber security and the channel

ComputerWeekly | Security Think Tank: Data architects should be key allies of infosec pros

maistecnologia | Falha de segurança em Whatsapp não foi consertada mesmo depois de 1 ano 

Information Security Buzz | Instagram’s Lax Privacy Practices Let A Trusted Partner Track Millions Of Users’ Physical Locations

Florida Post | Terrifying WhatsApp bug lets people edit YOUR texts as experts warn ‘bin the app now’

The Sun | WhatsApp bug lets people edit YOUR texts as experts warn ‘bin the app now’

Infosecurity Magazine | Interview: Conor Cronin and James Mullen, Edgescan