Fake data breaches: Countering the damage
Amid the constant drumbeat of successful cyberattacks, some fake data breaches have also cropped up to make sensational headlines. Unfortunately,...
Read more →Amid the constant drumbeat of successful cyberattacks, some fake data breaches have also cropped up to make sensational headlines. Unfortunately,...
Read more →Leaked secrets, a phenomenon known as ‘secrets sprawl,’ is a pervasive vulnerability that plagues nearly every organization. It refers to...
Read more →Ivanti has fixed a critical RCE vulnerability (CVE-2023-41724) in Ivanti Standalone Sentry that has been reported by researchers with the...
Read more →Zoom announces Zoom Compliance Manager, an all-in-one offering that provides archiving, eDiscovery, legal hold, and information protection capabilities to help...
Read more →Smaller RaaS groups are trying to recruit new and “displaced” LockBit and Alphv/BlackCat affiliates by foregoing deposits and paid subscriptions,...
Read more →Portnox introduced its Conditional Access for Applications solution. Available as part of the Portnox Cloud platform, Conditional Access for Applications...
Read more →ESET Research has recorded a considerable increase in AceCryptor attacks, with detections tripling between the first and second halves of...
Read more →According to the UAE Cybersecurity Council, in 2023, the UAE repelled over 50,000 cyberattacks daily. These findings, highlighted in a...
Read more →Data loss is a problem stemming from the interaction between humans and machines, and ‘careless users’ are much more likely...
Read more →As AI gets baked into enterprise tech stacks, AI applications are becoming prime targets for cyber attacks. In response, many...
Read more →A total of 29% of web attacks targeted APIs over 12 months (January through December 2023), indicating that APIs are...
Read more →Appdome has unveiled its new Social Engineering Prevention service on the Appdome platform. The new service enables mobile brands to...
Read more →