Searchlight Cyber announces rebrand that reflects its status as a fast-growing cybersecurity business.
Read moreHow AI/ML Can Thwart DDoS Attacks
December 21 2022When properly designed and trained, artificial intelligence and machine learning can help improve the accuracy of DDoS detection and mitigation.
Read moreStartups are coalescing around effective data loss prevention, reducing data attack surfaces, and viable AI automation.
Read moreCybersecurity VMRay Extends Series B Investment to a Total of $34 million USD to Drive Growth Into New Markets
December 21 2022VMRay announces the closing of a Series B led by global alternative asset manager Tikehau Capital, which will fuel further expansion of the product portfolio to target a broader...
Read more‘Blindside’ Attack Subverts EDR Platforms from Windows Kernel
December 20 2022The technique loads a non-monitored and unhooked DLL, and leverages debug techniques that could allow for running arbitrary code.
Read moreProtecting Hospital Networks From ‘Code Dark’ Scenarios
December 20 2022Asset inventory, behavioral baselining, and automated response are all key to keeping patients healthy and safe.
Read moreAWS Elastic IP Transfer Feature Gives Cyberattackers Free Range
December 20 2022Threat actors can take over victims' cloud accounts to steal data, or use them for command-and-control for phishing attacks, denial of service, or other cyberattacks.
Read moreAre 100% Security Guarantees Possible?
December 20 2022Large vendors are commoditizing capabilities that claim to provide absolute security guarantees backed up by formal verification. How significant are these promises?
Read moreSites spoofing Grammarly and a Cisco webpage are spreading the DarkTortilla threat, which is filled with follow-on malware attacks.
Read more
Recent Comments