KnowBe4 Research: Half of Employees Use Unauthorized File Services to Complete Work
February 28 2022Report examines the prevalence of two common insecure practices.
Read moreReport examines the prevalence of two common insecure practices.
Read moreThe Deep Instinct Threat Research team monitored attack volumes and types and extrapolated their findings to predict where the future of cybersecurity is heading, determine what motivates attackers, and...
Read moreInvicti SCA enables users to track and secure open-source components to reduce security risk.
Read moreBelarus-based APT behind the attacks may also be working in concert with Russia, researchers say.
Read moreA stealthy backdoor program used by China-linked threat actors has targeted government computers at multiple foreign agencies, allowing attackers to retain a presence on sensitive networks and exfiltrate data...
Read moreResearchers continue to improve on a technique for embedded crafted outputs into machine-learning models, an anti-copying technique originally thought up by adversarial researchers.
Read moreOrganizations will see big wins from applying security controls early in the development life cycle.
Read moreA lot of the recommended preparation involves measures organizations should have in place already.
Read moreUkraine's Computer Emergency Response Team calls out UNIC1151 nation-state hacking group out of Belarus as behind the attacks.
Read more
Recent Comments