6 Attack Surfaces You Must Protect
June 22 2023More connectivity means more potential ways into your enterprise, so securing every main attack surface is imperative.
Read moreMore connectivity means more potential ways into your enterprise, so securing every main attack surface is imperative.
Read moreCamaro Dragon (Mustang Panda) is spreading a malware variant of WispRider quickly across the globe even through air gaps, often unbeknown to users.
Read moreCompliance, seen as a burden for businesses, is being passed to overloaded IT departments — leaving organizations unsure if they're compliant at all.
Read moreFrom hardening Windows systems to adding access control and segmenting the network, there are steps organizations can take to better secure corporate data.
Read moreThe zero-day security bugs are being used to deploy the sophisticated but "odd" TriangleDB spying implant on targeted iOS devices.
Read moreApple didn't use the words "Triangulation Trojan", but you probably will.
Read moreThe company says its Themis Co-pilot for Outlook helps recipients discern business email compromise attacks, reducing false positives for security staff.
Read moreThe notorious APT15 used common malware tools and a third-generation custom "Graphican" backdoor to continue its information gathering exploits, this time against foreign ministries.
Read moreThe US Department of Justice adds litigators under its National Security Division to take on sophisticated cyber threats from adversarial nation-states.
Read moreGen Digital, the parent company of the security companies, is the latest victim in a rash of Cl0p attacks on the bug in the MOVEit transfer software, leading to...
Read more
Recent Comments