Most IT staff uncomfortable deploying surveillance tech at work
Corporate IT teams have expressed discomfort towards the use of employee surveillance technologies at work, with both workers and managers...
Read more →Corporate IT teams have expressed discomfort towards the use of employee surveillance technologies at work, with both workers and managers...
Read more →Can you imagine Hard Disk Drives (HDD) and Solid-State Disks (SSD) being immune to ransomware attacks? Well, a company named...
Read more →Flashpoint has released Ignite, a new intelligence platform that accelerates cross-functional risk mitigation and prevention across CTI, vulnerability management, national...
Read more →Apr 24, 2023Ravie LakshmananEndpoint Security / BYOVD Threat actors are employing a previously undocumented “defense evasion tool” dubbed AuKill that’s...
Read more →Reducing risk is fundamental to Wix’s approach to cybersecurity, and as the threat landscape evolves, they turn to HackerOne Bounty...
Read more →APC’s Easy UPS Online Monitoring Software is vulnerable to unauthenticated arbitrary remote code execution, allowing hackers to take over devices...
Read more →Threat actors frequently employ malicious Google Ads and SEO poisoning to spread malware. Recently, Secureworks’ Counter Threat Unit (CTU) researchers...
Read more →Apr 24, 2023Ravie LakshmananCyber Espionage The Russian-speaking threat actor behind a backdoor known as Tomiris is primarily focused on gathering...
Read more →The UK government is coming under pressure to publish the findings of a consultation into how the umbrella company market...
Read more →At Detectify, we made the decision early on to build a diverse team of individuals from different backgrounds, nationalities, and...
Read more →Twitter gold tick scam has been in the news lately for promoting a new kind of exploit on the platform. The...
Read more →Global median dwell time drops to just over two weeks, reflecting the essential role partnerships and the exchange of information...
Read more →