Two Years Since the Colonial Pipeline Hack, Here’s What We’ve Learned
By Matt Morris, Global Managing Director of Two years have passed since the notorious Colonial Pipeline hack, an incident that plunged the nation into a…
By Matt Morris, Global Managing Director of Two years have passed since the notorious Colonial Pipeline hack, an incident that plunged the nation into a…
Leading snowboard maker Burton Snowboards confirmed notified customers of a data breach after some of their sensitive information was “potentially” accessed or stolen during what…
By Jayakumar (Jay) Kurup, Global Sales Engineering Director at Securing operational technology (OT) creates unique challenges. Zero tolerance of downtime in factories, ports, banks, treatment…
To all those who are concerned about Netflix’s decision to ban password sharing in almost 100 countries, here’s a solution that appears to work for…
Use Source Code Assessments to Audit DevOps DevOps teams may care about security, but it is not their area of expertise and it is not…
Google has removed from the Chrome Web Store 32 malicious extensions that could alter search results and push spam or unwanted ads. Collectively, they come…
Jun 02, 2023Ravie LakshmananBotnet / Malware Spanish-speaking users in Latin America have been at the receiving end of a new botnet malware dubbed Horabot since…
Cybersecurity researchers at Cyble Research and Intelligence Labs (CRIL) have recently uncovered an ongoing campaign by the sophisticated hacking group known as SharpPanda APT. This…
LockBit ransomware group has claimed to hit YKK Group, the world’s largest zipper manufacturer, and has given the company a two-week deadline to fulfil their…
A recently discovered vulnerability called “Migraine” is linked to macOS migration and poses a serious threat. It enables attackers with root privileges to circumvent System…
Data security is reinventing itself. As new data security posture management solutions come to market, organizations are increasingly recognizing the opportunity to provide evidence-based security…
Kaspersky recently reported that a number of iPhones connected to its network were compromised through an iOS vulnerability. The attackers exploited iMessage’s zero-click exploits, allowing…