Corelight Investigator aids threat hunting and investigation through intelligent alert aggregation, built-in queries and scalable search
Read moreCylance co-founder Ryan Permeh has joined full time as an operating partner.
Read moreAccording to the findings, vishing attacks have overtaken business email compromise as the second most reported response-based email threat since Q3 2021.
Read moreGoogle has disclosed a nasty set of six bugs affecting Zoom chat that can be chained together for MitM and RCE attacks, no user interaction required.
Read moreThis year's finalists tackle such vital security concerns as permissions management, software supply chain vulnerability, and data governance. Winners will be announced June 6.
Read moreBrexit Leak Site Linked to Russian Hackers
May 25 2022Purporting to publish leaked emails of pro-Brexit leadership in the UK, a new site's operations have been traced to Russian cyber-threat actors, Google says.
Read moreImplement zero-trust policies for greater control, use BYOD management tools, and take proactive steps such as keeping apps current and training staff to keep sensitive company data safe and...
Read moreCLOP Ransomware Activity Spiked in April
May 25 2022In just one month, the ransomware group's activity rose by 2,100%, a new report finds.
Read moreYet another adversarial ML attack:
Most deep neural networks are trained by stochastic gradient descent. Now “stochastic” is a fancy Greek word for “random”; it means that the training...
Read more
With manufacturing ranking as the fourth most targeted sector, manufacturers that understand their exposure will be able to build the necessary security maturity.
Read more
Recent Comments