Endpoint Security Best Practices – 2023
In today’s age of widespread device collaboration, the number of endpoints within an organization is often enormous. On top of...
Read more →In today’s age of widespread device collaboration, the number of endpoints within an organization is often enormous. On top of...
Read more →China’s Storm-0558 hacked 25 organizations, including government agencies, using fake tokens for email access, aiming at espionage since May 15,...
Read more →The latest research reveals a new sophisticated attack carried through Webapk technology targeting Android devices. The threat actors manipulate the...
Read more →Zimbra is a widely used email client used by many organizations worldwide. The Zimbra Collaboration Suite provides a much more...
Read more →Generative AI technology is rapidly growing and advancing, driven by continuous research and development efforts. But, besides the growing advancements...
Read more →A critical severity vulnerability has been detected in the request authentication validation for the REST API of the Cisco SD-WAN...
Read more →Businesses face a myriad of information security risks that can be detrimental to their operations. Information security threats evolve rapidly,...
Read more →An unrecorded .NET Loader was identified during routine threat hunting that downloads, decrypts, and executes a wide range of malicious...
Read more →A china based APT actor accessed Microsoft 365 cloud environment and exfiltrated unclassified Exchange Online Outlook data from a small number...
Read more →Russia’s invasion of Ukraine on February 24, 2022, followed escalating cyber operations, categorized into six phases, by Russian troops amassed...
Read more →Recent reports from Team82 and Check Point Research (CPR) team state that there has been a major vulnerability in QuickBlox...
Read more →The significant plunge in cyber crimes shows a decent rise in legitimate services in the mid of this year, 2023....
Read more →