From Network Perimeters to Cloud Access Security Brokers to APIs: The Evolution of DLP Strategies
By Sudeep Padiyar, Senior Director, Product Management at Traceable AI When Data Loss Prevention (DLP) was conceived as a security...
Read more →By Sudeep Padiyar, Senior Director, Product Management at Traceable AI When Data Loss Prevention (DLP) was conceived as a security...
Read more →Three Command injection vulnerabilities have been discovered in Zyxel NAS (Network Attached Storage) products, which could allow a threat actor...
Read more →Government’s slow progress compensating subpostmasters who had their lives ruined by one of its organisations, the Post Office, has forced...
Read more →A malicious campaign targeting mobile banking users in Iran is relying on hundreds of Android applications for credential and credit...
Read more →A recent campaign has been observed to be delivering DJvu ransomware through a loader that pretends to be freeware or...
Read more →NoEscape ransomware group has listed Science History Institute on its dark web portal. Science History Institute shares stories of significant...
Read more →The latest analysis shows that tens of millions of people are creating weak passwords on three of the four most...
Read more →In a significant move to combat cyber-enabled criminal activities, the U.S. Department of the Treasury’s Office of Foreign Assets Control...
Read more →In a pivotal update to the Okta security incident divulged in October 2023, Okta Security has unearthed additional intricacies surrounding...
Read more →Luxury lingerie brand Honey Birdette seems to have become the latest target of the notorious 8Base ransomware group. The hacker...
Read more →We’re currently living in an age where digital threats loom large. Among these, ransomware has emerged as a formidable adversary,...
Read more →Nov 30, 2023NewsroomHacking / Cryptocurrency The U.S. Treasury Department on Wednesday imposed sanctions against Sinbad, a virtual currency mixer that...
Read more →