To protect against similar attacks, organizations should focus on bringing cloud entitlements and configurations under control.
Read moreAttackers are turning to stolen credentials and posing as trusted applications to socially engineer victims, according to Google study of malware submitted to VirusTotal.
Read moreAttackers are turning to stolen credentials and posing as trusted applications to socially engineer victims, according to Google study of malware submitted to VirusTotal.
Read moreWith over 323 million users of dating apps worldwide, study finds location spoofing is a threat to user trust and safety.
Read moreCybrary Lands $25 Million in New Funding Round
August 2 2022Series C investment from BuildGroup and Gula Tech Adventures, along with appointment of Kevin Mandia to the board of directors, will propel a new chapter of company growth.
Read moreBlackCloak Bolsters Malware Protection With QR Code Scanner and Malicious Calendar Detection Features
August 2 2022In conjunction with Black Hat 2022, pioneer of digital executive protection also announces new security innovations and SOC 2 Type II certification.
Read moreFrom adopting zero-trust security models to dynamic environments to operating under an "assumed breach" mentality, here are ways IT departments can reduce vulnerabilities as they move deliberately to become...
Read moreCREST Defensible Penetration Test Released
August 2 2022CREST provides commercially defensible scoping, delivery, and sign-off recommendations for penetration tests.
Read moreDoJ: Foreign Adversaries Breach US Federal Court Records
August 1 2022A Justice Department official testifies to a House committee that the cyberattack is a "significant concern."
Read more
Recent Comments