Prioritise automated hardening over traditional cyber controls, says report
Endpoint detection and response (EDR), multifactor authentication (MFA) and privileged access management (PAM) have long been the three tools most...
Read more →Endpoint detection and response (EDR), multifactor authentication (MFA) and privileged access management (PAM) have long been the three tools most...
Read more →LockBit ransomware group has allegedly breached private equity firm Nautic. Cybersecurity researchers shared details regarding the alleged Nautic cyberattack stating...
Read more →In August last year, Offensive Security announced that it was retiring the long-standing Offensive Security Certified Expert (OSCE) certification and...
Read more →Taiwanese PC parts maker MSI (Micro-Star International) has been listed on the extortion portal of a new ransomware gang known...
Read more →Just-in-time logistics mean that even short-term cyberattacks can have serious consequences. Hacks that disrupt fertilizer or pesticide production can force farmers to...
Read more →Google has introduced a new data deletion policy for the Google Play Store with the intention of giving customers more...
Read more →Google Play will be pushing Android app developers to allow users to delete their account and associated data from within...
Read more →A total of 91 new victims were added to the Clop (aka Cl0p) ransomware leak site during March 2023, more...
Read more →One of the more interesting things I’ve had the opportunity to hack on is the Tesla Model 3. It has...
Read more →Google’s TAG (Threat Analysis Group) released defensive measures that followed to protect users from the infamous North Korean government-backed APT...
Read more →The impact of identity fraud varies for organizations in the financial services industry, based on whether they belong to the...
Read more →A coordinated international law enforcement operation has dismantled Genesis Market, an illegal online marketplace that specialized in the sale of...
Read more →