Criminals will keep stealing end-user credentials despite employee awareness, so organizations need high-tech solutions as well.
Read moreStudy shows more than 97% have exposed assets on AWS — among a wide range of other issues.
Read moreDiversified Search Group Acquires Alta Associates
March 4 2022The firm continues rapid growth with the addition of industry-recognized experts on cybersecurity, data privacy, and IT risk management talent.
Read moreVade Releases 2021 Phishers’ Favorites Report
March 4 2022Vade's annual phishing report reveals a sharp rise in Facebook phishing and growing sophistication in Microsoft phishing attacks.
Read moreConti Ransomware Group Diaries, Part III: Weaponry
March 4 2022Part I of this series examined newly-leaked internal chats from the Conti ransomware group, and how the crime gang dealt with its own internal breaches. Part II explored what...
Read moreThe new EU regulation is a response to the rise of ransomware attacks and other new cyberthreats that have proliferated in the wake of the global pandemic.
Read moreSamsung Encryption Flaw
March 4 2022Researchers have found a major encryption flaw in 100 million Samsung Galaxy phones.
From the abstract:
In this work, we expose the cryptographic design and implementation of Android’s Hardware-Backed Keystore...
Read more
Threat actors have focused on two ends of the spectrum — quick, impactful attacks or stealthy intrusions — making strong prevention and faster response more important for enterprises.
Read moreCybersecurity Mesh Architecture: Hope or Hype?
March 3 2022Gartner has touted CSMA as one of the top technology trends for this year. But what is it really?
Read moreResearchers say passwords with less than seven characters can be hacked "instantly."
Read more
Recent Comments