To improve your cybersecurity posture, focus on the data
Effectively converging, managing and using enterprise data is a huge undertaking. Enterprises have vast hoards of data, but those hoards...
Read more →Effectively converging, managing and using enterprise data is a huge undertaking. Enterprises have vast hoards of data, but those hoards...
Read more →x64dbg is an open-source binary debugger for Windows, designed for malware analysis and reverse engineering of executables without access to...
Read more →Despite their role in connecting applications and driving innovation, APIs often suffer from serious security vulnerabilities. Recent investigations reveal that...
Read more →Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Unpatched MS Office flaw may...
Read more →Google Search ads that target users looking for Google’s own services lead them to spoofed sites and Microsoft and Apple...
Read more →I recently spent six days in Las Vegas attending DEF CON, BsidesLV, and Black Hat USA 2024, where I had...
Read more →Cyber threats continued to intensify in the first half of 2024 as cybercriminals exploited security gaps from growing business and...
Read more →Authentik is an open-source identity provider designed for maximum flexibility and adaptability. It easily integrates into existing environments and supports...
Read more →Here’s a look at the most interesting products from the past week, featuring releases from ClearSale, Guardio, Ivanti, Resecurity, and...
Read more →Cybercriminals are breaking into organizations’ cloud storage containers, exfiltrating their sensitive data and, in several cases, have been paid off...
Read more →SolarWinds has fixed a critical vulnerability (CVE-2024-28986) in its Web Help Desk (WHD) solution that may allow attackers to run...
Read more →The total number of DDoS attacks during H1 2024 amounted to 830,000, an increase of 46% when compared to H1...
Read more →