Atakama Browser Security Platform improves security for MSPs
Atakama unveild the Atakama Browser Security Platform for MSPs. Developed in collaboration with 30-plus MSP design partners, over the past year, Atakama has broken new…
Atakama unveild the Atakama Browser Security Platform for MSPs. Developed in collaboration with 30-plus MSP design partners, over the past year, Atakama has broken new…
In a spy-vs-spy type of scenario, Microsoft has acknowledged that a group called Midnight Blizzard (also known as APT29 or Cozy Bear), gained access to…
Jan 23, 2024NewsroomMalware / Cryptocurrency Cracked software have been observed infecting Apple macOS users with a previously undocumented stealer malware capable of harvesting system information…
The discovery of 12TB (terabytes) of stolen personally identifiable information (PII) and credentials comprising 26 billion records relating to millions, possibly billions, of individuals, may…
LoanDepot data breach impacted roughly 16.6 individuals Pierluigi Paganini January 23, 2024 Financial services company LoanDepot disclosed a data breach that impacted roughly 16.6 million…
Atlassian disclosed a critical vulnerability last week related to Remote Code Execution (CVE-2023-22527). This particular vulnerability was reported to be affecting Confluence Data Center and…
In a brazen act of digital deception, the U.S. Securities and Exchange Commission’s (SEC) official Twitter account, @SECGov, was compromised on January 9th, 2024. This…
The cybersecurity researchers at Huntress have issued a warning about a recent surge in cyber attacks, highlighting a new strategy employed by cybercriminals who are…
Jan 23, 2024NewsroomCyber Crime / Dark Web Conor Brian Fitzpatrick has been sentenced to time served and 20 years of supervised release for his role…
Technology companies are pursuing profits from artificial intelligence (AI) “with a clear disregard” for human rights, privacy and other social consequences, all while governments around…
CISA adds VMware vCenter Server bug to its Known Exploited Vulnerabilities catalog Pierluigi Paganini January 23, 2024 U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds…
Infrastructure as Code (IaC) is a popular DevOps practice that manages and provides IT infrastructure through code rather than manual processes. This shift streamlines operations…