The company introduces a solution to restore trust in customers' existing cyber defense techstack.
Read moreNew report offers valuable resource to help organizations evaluate the safety and reliability of open-source packages.
Read moreVirtual kidnapping is just one of many new artificial intelligence attack types that threat actors have begun deploying, as voice cloning emerges as a potent new imposter tool.
Read moreWorkers were lured in by false job promises from Facebook ads, only to be tricked into committing cybercrimes with no way out.
Read moreOrganizations should consider their security practices the same way people think about their well-being. Focus on staying healthy instead of finding a new pill for every security symptom you...
Read moreUS Patent Office Hacked, Trademark Apps Accessed
June 30 2023Misconfiguration exposed the physical addresses of 60,000 patent filers over three years.
Read more3 Tips to Increase Hybrid and Multicloud Security
June 29 2023As cloud adoption grows, organizations need to rethink their approaches to securing hybrid cloud and multicloud environments.
Read moreWe're still unprepared to fight the security bugs we already encounter, let alone new AI-borne issues.
Read moreA new version of the double-extortion group's malware reflects a growing trend among ransomware actors to expand cybercrime opportunities beyond Windows.
Read more
Recent Comments