Mobile users in the Middle East and Africa often download moneylending apps that ask for excessive permissions — an all too common issue in an area where mobile-only is...
Read moreThreat groups created a fake security company, "High Sierra," with faux exploits and fake profiles for security researchers on GitHub and elsewhere, aiming to get targets to install their...
Read moreCybercrime Doesn’t Take a Vacation
June 16 2023Organizations need to prepare for security threats as summer holidays approach.
Read moreThe new privileged access management and secrets management capabilities tackles access issues and secret sprawl across the cloud environment.
Read moreA few lines of code can help you prevent accidental exposure, manage sensitive information, and maintain different configurations for various environments.
Read moreCoalition ESS uses AI to generate dynamic risk scores to help organizations mitigate their most critical risks faster.
Read moreThe company aims to empower enterprises to securely manage their endpoints and remediate vulnerabilities from the cloud, enabling a work-from-anywhere environment with confidence.
Read moreA third perp has been fingered, but CISA warns that LockBit variants continue to be a major threat on a global scale.
Read more
Recent Comments