Google Cloud MFA enforcement meets with approval
The cyber security community has reacted positively to Google’s 4 November announcement that it will begin to enforce multifactor authentication (MFA) for millions of Google…
The cyber security community has reacted positively to Google’s 4 November announcement that it will begin to enforce multifactor authentication (MFA) for millions of Google…
Hackers primarily target Windows systems due to their significant market share: Over 80% of desktop operating systems run Windows. Not only that even nearly 50%…
Hewlett Packard Enterprise (HPE) released updates for Instant AOS-8 and AOS-10 software to address two critical vulnerabilities in Aruba Networking Access Points. The two security…
Cybercriminals are utilizing a sophisticated evasion strategy called ZIP file concatenation to specifically target Windows users. This method combines several ZIP files into a single…
CloudSEK reports that the Androxgh0st botnet has integrated with the Mozi botnet and exploits a wide range of vulnerabilities in web applications and IoT devices.…
As the frequency and sophistication of cyberattacks on cloud platforms continue to rise, leading service providers are taking significant steps to bolster security and protect…
A slender 54% majority of UK cyber security professionals believe threat actors stand to benefit more from artificial intelligence (AI) than they do, according to…
Hackers target Cisco primarily due to its critical role in global network infrastructure and security. Cisco’s devices are essential for protecting sensitive data and communications…
Small and medium-sized business (SMB) are increasingly dependent on managed services providers (MSPs) for their IT needs. In line with this, according to “The State of SMB Cybersecurity…
Today I have great news to share: We’ve acquired AzireVPN, a privacy-focused VPN provider based in Sweden. I wanted to share with you our intentions…
The Post Office is in the process of appointing a third party to review its controversial Horizon computer system amid continued unexplained losses in branches.…
State and local government and education organizations (also known as SLED) were always at risk from cyberattacks, but the rise of generative AI has increased those risks…