A New Security Category Addresses Web-borne Threats
In the modern corporate IT environment, which relies on cloud connectivity, global connections and large volumes of data, the browser…
In the modern corporate IT environment, which relies on cloud connectivity, global connections and large volumes of data, the browser…
Scammers have already started taking advantage of Silicon Valley Bank’s bankruptcy to trick people into believing they’ve also been exposed…
Geoblocking is the practice of denying access to certain websites and services to users from specific locations, usually based on…
Hackers use AI-generated YouTube videos to deploy Raccoon, RedLine, and Vidar malware. The videos look like tutorials on how to…
Neatly aligned glass spice jars tagged with printed white labels. Wicker baskets filled with packages of pasta, crackers and snacks.…
BianLian is a ransomware group that first appeared in July 2022, successfully infiltrating several high-profile organizations. It seems that recently,…
Copycat websites for instant messaging apps like Telegram and WhatApp are being used to distribute trojanized versions and infect Android…
Presently sponsored by: Kolide ensures only secure devices can access your cloud apps. It’s Device Trust tailor-made for Okta. Book…
Microsoft released its monthly security bulletin this week, covering patches for over 80 vulnerabilities across its products. However, two of…
In a world where rhetorical gaffes can get you fired, you might imagine that corporate executives would be careful about…