The growing threat of identity-related cyberattacks: Insights into the threat landscape
The last 12 months have witnessed a rapid-fire round of innovation and adoption of new technologies. Powerful new identities, environments…
The last 12 months have witnessed a rapid-fire round of innovation and adoption of new technologies. Powerful new identities, environments…
ESET researchers have identified five campaigns targeting Android users with trojanized apps. Most probably carried out by the Arid Viper…
Jun 14, 2024NewsroomArtificial Intelligence / Data Protection Microsoft on Thursday revealed that it’s delaying the rollout of the controversial artificial…
6. No big deal? The OMB made a big deal of one incident involving a bad actor gaining access to…
In this day and age, technology and business are inextricably linked. Digital transformation has ushered in unparalleled opportunities for organizations…
Jun 12, 2024NewsroomKubernetes / Endpoint Security Cybersecurity researchers have warned of an ongoing cryptojacking campaign targeting misconfigured Kubernetes clusters to…
Downtime cost large enterprises an average of $200 million annually, cutting 9% from yearly profits, according to a study commissioned…
Digital Security Drumroll, please! The winners of the 2024 European Cybersecurity Blogger Awards have been chosen, and we couldn’t be…
Jun 10, 2024NewsroomPhishing Attack / Cybercrime Cybersecurity researchers have spotted a phishing attack distributing the More_eggs malware by masquerading it…
And in another similarity to conventional attack types, “nation-states are probably one of the biggest risks here because they have…