The same infrastructure traced back to Russian-speaking threat group Nobelium is being used to set up misspelled domain names, presaging impersonation attacks bent on credential harvesting, analysts say.
Read moreThe security vulnerability puts wide swaths of industrial networks and IoT devices at risk of compromise, researchers warn.
Read moreThe infamous ransomware group appears to be back from the dead — maybe — and using the old brand, but experts question whether a reconstituted gang will have much...
Read moreSyxsense Enterprise delivers real-time vulnerability monitoring and remediation for all endpoints across an organization’s entire network.
Read moreBy providing these apps and other add-ons for SaaS platforms and associated permissions, businesses present bad actors with more opportunities to gain access to company data.
Read moreDespite concerns that some websites might break when Chromium and then Firefox reached version 100, the web still seems to be intact.
Read moreResearchers are using the reflection of the smartphone in the pupils of faces taken as selfies to infer information about how the phone is being used: For now, the research...
Read moreAs the talent shortage rages on, companies have found mentorship programs to be one of the best ways to obtain the security skills they need to develop their existing...
Read moreTiger Global Management invests $35 million in SkyHawk Security to accelerate growth.
Read moreTeleport Raises $110 Million Series C at $1.1 Billion Valuation Led by Bessemer Venture Partners
May 3 2022Funding follows dramatic revenue growth as identity-based access requirements skyrocket.
Read more
Recent Comments