A voicemail-themed phishing campaign is hitting specific industry verticals across the country, bent on scavenging credentials that can be used for a range of nefarious purposes.
Read moreSynopsys Completes Acquisition of WhiteHat Security
June 22 2022Addition of WhiteHat Security provides Synopsys with SaaS capabilities and dynamic application security testing (DAST) technology.
Read moreAqua Security Collaborates With Center for Internet Security to Create Guide for Software Supply Chain Security
June 22 2022In addition, Aqua Security unveiled a new open source tool, Chain-Bench, for auditing the software supply chain to ensure compliance with the new CIS guidelines.
Read moreOpen service generates free report detailing potential gaps in compliance, configuration, and security for a user’s multiple domain names.
Read moreResearchers have spotted the threat group, also known as Fancy Bear and Sofacy, using the Windows MSDT vulnerability to distribute information stealers to users in Ukraine.
Read moreDon't sleep on Magecart attacks, which security teams could miss by relying solely on automated crawlers and sandboxes, experts warn.
Read moreTreat identity management as a first-priority problem, not something to figure out later while you get your business up and running in the cloud.
Read moreTreat identity management as a first-priority problem, not something to figure out later while you get your business up and running in the cloud.
Read moreTanium Partners With ScreenMeet to Enable Employees to Securely Connect to Their Remote Desktops
June 22 2022partnership lets users access one-click ScreenMeet sessions from the Tanium platform.
Read moreZscaler and AWS Expand Relationship
June 22 2022Zscaler also announced innovations built on Zscaler’s Zero Trust architecture and AWS.
Read more
Recent Comments