Remote Monitoring & Management software used in phishing attacks
Remote Monitoring & Management (RMM) software, including popular tools like AnyDesk, Atera, and Splashtop, are invaluable for IT administrators today,...
Read more →Remote Monitoring & Management (RMM) software, including popular tools like AnyDesk, Atera, and Splashtop, are invaluable for IT administrators today,...
Read more →Despite its infrastructure being seized and dismantled in a multinational law enforcement sting in the summer of 2023, the Qakbot...
Read more →Governments across Australia are nearing consensus on “core areas of consistency” for how they approach generative AI and fold it...
Read more →Bank of America customer data compromised after a third-party services provider data breach Pierluigi Paganini February 13, 2024 Bank of...
Read more →Tag CVE ID CVE Title Severity .NET CVE-2024-21386 .NET Denial of Service Vulnerability Important .NET CVE-2024-21404 .NET Denial of Service...
Read more →The Darwinian Effect in the Threat Community By Augusto Barros, Vice President Cyber Security Evangelist at Securonix Among the typical...
Read more →Ivanti has released patches for vulnerabilities found in its enterprise VPN appliances, including two flagged as exploited zero-days in early...
Read more →In 2022, we published an article about how photographs of children taken by a stalkerware-type app were found exposed on...
Read more →Feb 13, 2024NewsroomCyber Threat / Malware The threat actors behind the PikaBot malware have made significant changes to the malware...
Read more →In this podcast, we look at snapshots and their role in data protection strategy with Shawn Meyers, field chief technology...
Read more →As the implementation date of the Product Security and Telecommunications Infrastructure (PSTI) Act approaches, security professionals must understand and prepare...
Read more →Hackers are believed to have used a stolen private key to mint and steal over $290 million in PLA tokens,...
Read more →