Double Extortion Ransomware: The New Normal
With more and more businesses learning how to avoid paying huge amounts of money to ransomware actors by maintaining up-to-date…
With more and more businesses learning how to avoid paying huge amounts of money to ransomware actors by maintaining up-to-date…
EXECUTIVE SUMMARY: Artificial intelligence has transcended its status as a buzzword and has become a true catalyst for digital transformation.…
The Promise and Limitations of ‘Password-less’ Authentication By Tal Zamir, CTO of Perception Point “Please enter your password.” For those…
By Thomas Segura, Cyber Security Expert, GitGuardian The last few weeks have been very challenging for data protection experts. In…
By Dr. Inka Karppinen, CPsychol. Lead Behavioural Scientist, CybSafe While many commentators continue to tout technological solutions to various cyber…
The UK Electoral Commission discovered last year that it was hacked the year before. That’s fourteen months between the hack…
Ivanti Avalanche EMM product is impacted by two buffer overflows collectively tracked as CVE-2023-32560. Tenable researchers discovered two stack-based buffer…
A threat actor has compromised roughly 2,000 Citrix NetScaler servers exploiting a remote code execution tracked as CVE-2023-3519. In July…
The cyberattacks used the legitimate Salesforce.com domain by chaining the vulnerability to an abuse of Facebook's Web games platform, slipping…
The incident marks the second time since 2019 that a misconfiguration could have let threat actors "have it their way"…