A new information stealer has been recently found by cybersecurity researchers at Morphisec which is called “SYS01stealer.” This stealer primarily…
Ben Rothke, CISSP, CISM, CISA, is a Senior Information Security Manager at Tapad Going to RSA 2023? Failing to plan…
Kensington has expanded its robust portfolio of data protection solutions with the launch of three new privacy screens. The SA270…
As threats grow and attack surfaces get more complex, companies continue to struggle with the multitude of tools they utilize…
Medusa ransomware gang has slapped a million-dollar ransom note on the Minneapolis Public Schools District, days after the school district…
Australia’s competition watchdog is set to examine the ever-expanding ecosystems of Google, Amazon, Apple, Facebook and Microsoft, and the extent…
Acer, a global Taiwanese company that makes hardware and electronics, has admitted that one of its servers was compromised. Attackers…
By Scott Register, Vice President, Security Solutions, Keysight Technologies We’ve all seen the rush to deploy the new wave of…
Understand the limits of data consent when sending cold emails By Tim Green, Cybersecurity Specialist Cold emailing is an important…
Akamai Technologies has introduced the Akamai Hunt security service that enables customers to capitalize on the infrastructure of Akamai Guardicore…
CrowdStrike has forecast fiscal year 2024 revenue to come in above market estimates, the latest sign that spending on cyber…
The hacker behind the HDFC Bank subsidiary breach was also behind the Acer Inc. data breach that took place a…








