How Can I Protect My SaaS Apps Amid Employee Turnover?
September 7 2022A SaaS-specific security solution can help security teams make sure apps and usage are both secure, reducing the chances of a breach.
Read moreA SaaS-specific security solution can help security teams make sure apps and usage are both secure, reducing the chances of a breach.
Read moreThe Shikitega malware takes over IoT and endpoint devices, exploits vulnerabilities, uses advanced encoding, abuses cloud services for C2, installs a cyptominer, and allows full remote control.
Read moreAPT42 is posing as a friend to people considered threats to the government, using a raft of different tools to steal relevant info and perform surveillance.
Read moreThis article makes LockBit sound like a legitimate organization:
The DDoS attack last weekend that put a temporary stop to leaking Entrust data was seen as an opportunity to...
Read more
Here are a few measures your organization can implement to minimize fraudulent behavior and losses.
Read moreA relative newcomer to the ransomware scene, the BlackCat group quickly gained notoriety and may be associated with other APT groups like Conti and DarkSide.
Read moreThe threat actor — whose techniques and procedures do not match known groups — has created custom attack tools, including a program that hides scripts in .PNG images.
Read moreWhat under-the-hood details of newly discovered attack control panel tells us about how the Evil Corp threat group manages its ServHelper backdoor malware campaigns.
Read moreHours after Los Angeles Unified School District hit with ransomware attack, CISA issued an alert that threat actors are actively targeting the education sector.
Read moreCome up with a clever caption, and our panel of experts will reward the winner with a $25 Amazon gift card.
Read more
Recent Comments