Cybercriminals create new methods to evade legacy DDoS defenses
The number of DDoS attacks we see around the globe is on the rise, and that trend is likely to...
Read more →The number of DDoS attacks we see around the globe is on the rise, and that trend is likely to...
Read more →IT decision makers’ priorities have shifted over the past 12 months and their top areas of focus as they head...
Read more →Less sophisticated fraud — in which doctored identity documents are readily spotted — has jumped 37% in 2022, according to...
Read more →Avast CISO Jaya Baloo explains what quantum computing is, talks about its promises and potential pitfalls, and urges organizations to...
Read more →5G continues its dominating advance, as global 5G wireless connections look to surpass 1.1 billion by the end of 2022,...
Read more →Regula has presented their vision of the developments that will shape the industry’s landscape in 2023. Deepfakes, new cyber-hygiene norms,...
Read more →The third quarter of 2022, APWG observed 1,270,883 total phishing attacks — is the worst quarter for phishing that APWG...
Read more →As technology continues to evolve for business and personal use, cybercriminals are also leveraging innovation in the next generation of...
Read more →Misguided enterprise investment in multiple identity tools is proving insufficient in defending against today’s threat landscape, according to One Identity....
Read more →In a time of increased remote work and growing cyber threats, SMEs face major cybersecurity challenges. Low-security budget, lack of...
Read more →NordLayer’s Device Posture Monitoring allows companies to determine whether a device is compliant with existing cybersecurity policies and can be...
Read more →ConcealBrowse, secure browser extension, performs pre- and post-processing of code on a computer to protect against browser-borne attacks including RATs,...
Read more →