The rise of the cloud-conscious adversary – Partner Content – Security
The opportunities and benefits of the cloud have created new business models for organisations. But at the same time, criminal enterprises and other threat actors…
The opportunities and benefits of the cloud have created new business models for organisations. But at the same time, criminal enterprises and other threat actors…
Cybercriminals employ artificial intelligence (AI) to create complex email threats like phishing and business email compromise (BEC) attacks, while modern email security systems use AI…
The Victorian government is claiming a success for its digital driver license (DDL) pilot in Ballarat, ahead of a statewide rollout “by 2024”. Government service…
In this Help Net Security interview, Roland Atoui, Managing Director at Red Alert Labs, discusses the intricacies of transitioning from isolated IoT setups to interconnected…
Palo Alto Networks has published its response to the TunnelCrack VPN eavesdropping technique that academics demonstrated earlier this month. The researchers announced that most VPNs…
While H1 2023 saw an encouraging decrease in the overall number of data breaches impacting healthcare organizations, it was overshadowed by large-scale breaches resulting in…
VMware has developed a new set of software tools in partnership with Nvidia aimed at businesses which want to develop generative artificial intelligence in their…
By Karthik Krishnan, CEO, Concentric AI Artificial intelligence (AI) has achieved remarkable advancements over the past few years, with examples such as ChatGPT dominating recent…
Woolworths Group says the role of digital and analytics capabilities is only increasing in importance, with the company continuing to build on existing foundations and…
A new version of WinRAR is available that patches two vulnerabilities attackers could use for remote code execution. A new version of the file archiving…
An example use case of bbrf, here integrating with subfinder from projectdiscovery.io Like anyone involved in bug bounty hunting, I have encountered a number of…
Defeat alert fatigue using specialized threat intelligence. Sleepless nights, missed threats, a deluge of notifications—the common symptoms of the bane of IT teams everywhere: Alert fatigue.…