Infostealer malware, which consist of code that infects devices without the user’s knowledge and steals data, remains widely available to…
You’ve just been named as your organization’s new head of security. So what do you do first? Read part one…
KRY is undoubtedly one of Sweden’s most successful and talked-about startups. The company offers video consultations with licensed doctors through…
Applications have become the lifeblood of businesses in today’s connected world. Software is now the “front door” into your business…
A financially motivated cybergang tracked by Mandiant as ‘UNC3944’ is using phishing and SIM swapping attacks to hijack Microsoft Azure…
Most VPN users can be put in one of three categories. It all depends on your needs and your threat…
Web security in 2016 is very different from what it was like in 2006, 1996 or even further back. As…
Cybersecurity researchers and IT admins have raised concerns over Google’s new ZIP and MOV Internet domains, warning that threat actors…
Lacroix develops and manufactures electronic equipment for the automotive, home automation, aerospace, industrial, and healthcare industries. Lacroix also creates and…
The magnitude of the data breach is significant, as it has potentially compromised the personal information of 286,699 individuals. Credit…
The below is a modified version of a blog originally posted by Martin Heiland, Security Officer at web-based communication, collaboration…
Cybersecurity researchers and IT admins have raised concerns over Google’s new ZIP and MOV Internet domains, warning that threat actors…










