The Third-Party Threat for Financial Organisations
DORA’s supply chain security requirements IT Governance’s research for November 2023 found that 48% of the month’s incidents originated from…
DORA’s supply chain security requirements IT Governance’s research for November 2023 found that 48% of the month’s incidents originated from…
Unwrapping a new gadget this holiday season will put a big smile on your face but things may quickly turn…
An exposed instance contained information for a customer relationship management (CRM) system that likely belongs to Goyzer, a real estate…
Seven months after our first investigation, a fuller portrait of the criminal gang and its tactics emerges
Critical for organizations to understand attackers’ tactics, techniques, and procedures. By Bobby Cornwell, Vice President, Strategic Partnership Enablement & Integration,…
By James Allman Talbot, Head of Incident Response & Threat Intelligence, Quorum Cyber Since computers were first connected with Ethernet…
How blockchain-powered software is preventing cyber attacks By Ramon AB, CEO and Co-Founder of Nova Technology Invoicing may not be…
EXECUTIVE SUMMARY: In businesses everywhere, mention of Artificial Intelligence (AI) simultaneously evokes a sense of optimism, enthusiasm and skepticism, if…
ESET fixes a high-severity flaw in Secure Traffic Scanning Feature that could have been exploited to cause web browsers to…
The antivirus software stands as a critical defense line against cyber-attacks. To fully understand how it operates, it’s vital to…