2023
Rogue ChatGPT extension FakeGPT hijacked Facebook accounts
A tainted version of the legitimate ChatGPT extension for Chrome, designed to steal Facebook accounts, has thousands of downloads. Guardio’s…
Remaining Proactive at Identifying Risks Keeps You Ahead of Hackers
By Carl Torrence, Content Marketer at Marketing Digest Why is cybersecurity such a big issue in organizations all over the…
Why Businesses Need to Leverage the NIST Post Quantum Cryptographic Standards to Fortify Their Cybersecurity Future
By Dr Ali El Kaafarani, Founder and CEO of PQShield July 5th, 2022, marked an important milestone in the fight…
Vulnerability Prioritization is Not a One-Size Fits All Approach
By Victor Gamra, CISSP, Founder and CEO of FortifyData System vulnerabilities are ever increasing as adoption of new and emerging…
Top 5 Questions to Ask When You’re Building a Cloud Security Strategy
By Metin Kortak, chief information security officer, Rhymetec As companies began moving their computing operations and data storage to the…
There’s no way you’re still using Consumer Messaging Apps for Business
By Nicole Allen, Senior Marketing Executive, Salt Communications Consumer messaging apps are routinely utilised for business purposes even if they…
Stop Backing Up Ransomware
By James Gorman When utilizing cloud technology for workloads, companies often assume that their current backup strategy is sufficient for…
The WAN Under Siege
WAN managers say they’re adopting zero trust security and using multiple infrastructure security vendors in response to the latest threats…
The Crows Have Always Been the Best Part of Shadow and Bone
If you’ve discovered Shadow and Bone thanks to Netflix, you might be thinking to yourself, “Maybe I’ll pick up the…
