IT’s shift to the cloud: Veeam’s data protection report in detail
IT has undergone a significant shift to the cloud, but may have stabilised – for now – at about half...
Read more →IT has undergone a significant shift to the cloud, but may have stabilised – for now – at about half...
Read more →The FBI has confirmed that the North Korean state-sponsored ‘Lazarus’ and APT38 hacking groups were behind the theft of $100...
Read more →Researchers uncovered a new uncommon technique employed by Chinese threat actors in which Golang Source Code Interpreter used to evade...
Read more →By Sanjay Raja, VP of Product Marketing and Solutions Insider threats are more dangerous and more top of mind for...
Read more →ioSafe introduced the ioSafe 1522+, a five-bay network attached storage (NAS) device for businesses of all sizes, including those with...
Read more →Vulnerability analysis results in Orange Cyberdefenses’ Security Navigator show that some vulnerabilities first discovered in 1999 are still found in...
Read more →Security teams are warned to be on the lookout for a growing wave of opportunistic and largely untargeted cyber attacks...
Read more →Popular Pro-Russian hacker group, NoName057, has allegedly launched a DDoS attack against cybersecurity software company, Avast. Dark web researchers told...
Read more →Cybercriminal forums have been flourishing despite new, more secure technologies and constant pressure from law enforcement. Researchers have came across...
Read more →GoTo (formerly LogMeIn) is warning customers that threat actors who breached its development environment in November 2022 stole encrypted backups...
Read more →John Leyden 24 January 2023 at 13:22 UTC Updated: 24 January 2023 at 13:30 UTC Manufacturer complacency ‘translates into an...
Read more →Mandiant recently reported that a group of hackers originating from China utilized a vulnerability within FortiOS SSL-VPN that had only...
Read more →