What You Need To Know
The Chief Justice of Pennsylvania, Debra Todd, revealed that the Pennsylvania Courts’ website is currently facing disruptions due to a denial of service (DDoS) attack.…
The Chief Justice of Pennsylvania, Debra Todd, revealed that the Pennsylvania Courts’ website is currently facing disruptions due to a denial of service (DDoS) attack.…
The ‘Mother of all Breaches’: Navigating the Aftermath and Fortifying Your Data with DSPM Pierluigi Paganini February 04, 2024 What is Data Security Posture Management…
Over the next few years, the number of organizations navigating to the cloud to advance their business goals is expected to grow exponentially. According to…
Feb 05, 2024NewsroomSpyware / Surveillance The iPhones belonging to nearly three dozen journalists, activists, human rights lawyers, and civil society members in Jordan have been…
IT security leaders are recognising the risks and opportunities of generative artificial intelligence (GenAI) for enterprise IT. In April 2023, a survey conducted with Gartner’s…
The impact of the massive Okta data breach lingers, continuing to provide an opportunistic terrain for hackers. Cloudflare, a prominent player in internet infrastructure and…
Software firm AnyDesk disclosed a security breach Pierluigi Paganini February 05, 2024 Remote desktop software company AnyDesk announced that threat actors compromised its production environment.…
AnyDesk, a widely-used platform for remote access software, fell victim to a ransomware attack, exposing its source code and private code sign keys to hackers.…
Escape’s security research team scanned 189.5 million URLs and found more than 18,000 exposed API secrets. 41% of exposed secrets were highly critical, i.e. could…
A recent malware campaign dubbed “Commando Cat” has set its sights on exposed Docker API endpoints, posing a significant threat to cloud environments. This detailed…
A new large-scale campaign named “ApateWeb ” has been discovered, which uses over 130,000 domains to deliver scareware, potentially unwanted programs, and other scam pages.…
In the realm of cybersecurity, understanding the nuances between hashing, salting, and encryption is crucial for safeguarding sensitive data. Each method serves a distinct purpose…