Automating the API Security Lifecycle – An Interview with Subbu Iyer of Cequence Security
is pioneering innovation in the API security space, and Subbu Iyer, the company’s VP of Product Management, provided a comprehensive...
Read more →is pioneering innovation in the API security space, and Subbu Iyer, the company’s VP of Product Management, provided a comprehensive...
Read more →The U.S. government’s clampdown on commercial spyware and mercenary hacking companies ramped up this week with the addition of Cytrox...
Read more →Citrix today is alerting customers of a critical-severity vulnerability (CVE-2023-3519) in NetScaler ADC and NetScaler Gateway that already has exploits...
Read more →Cybersecurity vendor Sophos is being impersonated by a new ransomware-as-a-service called SophosEncrypt, with the threat actors using the company name...
Read more →Recently, Ohio Secretary of State Chief Information Security Officer Jillian Burner, and HackerOne Co-founder and Head of Professional Services, Michiel...
Read more →The cybercrime group FIN8 is using a revamped version of the Sardonic backdoor to deliver the BlackCat ransomware. The financially motivated group...
Read more →Creating Continuous Attack Resistance In order to stay ahead of cybercriminals, businesses need to preemptively find flaws in their digital...
Read more →The global cyber insurance market is expected to reach over $20 billion by 2025. However, many organizations are finding it...
Read more →Citrix today is alerting customers of a critical-severity vulnerability (CVE-2023-3519) in NetScaler ADC and NetScaler Gateway that already has exploits...
Read more →Email is a key, highly effective communication concept used by a variety of business environments around the world. Against this...
Read more →A sophisticated nation-state adversary with advanced capabilities attacked Jumpcloud with a spear phishing attack. JumpCloud is a US-based zero-trust directory...
Read more →Other lawmakers are alarmed by the FBI’s disclosure of having purchased location information derived from people’s cell phones. During a...
Read more →