News & Updates

Belk hit by May cyberattack: DragonForce stole 150GB of data

Ransomware group DragonForce claims it attacked U.S. retailer Belk in May, stealing over 150GB of data in a disruptive cyberattack. The infamous Ransomware group DragonForce claimed responsibility for the May disruptive attack on US department store chain Belk. The ransomware gang claimed it had stolen 156 gigabytes of data from Belk. Belk, Inc. is a […]
News & Updates

SIM scammer’s sentence increased to 12 years, after failing to pay back victim $20 million

Remember well-heeled Manhattan resident Nicholas Truglia?

Back in 2022, we told you how he had been sentenced to prison for his part in orchestrating a SIM swap scam that stole US $22 million in cryptocurrency.

It was quite the downfall for the plucky scammer who on the day of the theft had allegedly bragged to his father and friends about how much cryptocurrency had been stolen, and offered to take them to the Super Bowl with “porn star escorts.”

You may even recall the shock felt by many ob

Cybersecurity Tools

Heimdal Achieves IP Co-Sell Ready and MACC Eligible Status with Microsoft

Heimdal can now be purchased through Microsoft’s global sales teams and counts toward Azure spending commitments.  This partnership opens new doors for companies looking to strengthen their cybersecurity while making the most of their existing Microsoft investments.  What this means for you  IP Co-Sell Ready status means Microsoft’s sales teams can now sell Heimdal’s solutions […]

The post Heimdal Achieves IP Co-Sell Ready and MACC Eligible Status with Microsoft appeared first on Heimdal Security Blog.

Cybersecurity Tools

The Role of ZTNA in Insider Threat Mitigation: A Silent Game-Changer

In today’s fast-evolving threat landscape, enterprises often focus heavily on external cyberattacks, overlooking one of the most potent and damaging risks: insider threats. Whether it’s a malicious employee, a careless contractor, or a compromised user account, insider threats strike from within the perimeter, making them harder to detect, contain, and mitigate. As organizations become more […]

The post The Role of ZTNA in Insider Threat Mitigation: A Silent Game-Changer appeared first on Blogs on Information Technology, Network & Cybersecurity | Seqrite.

Exit mobile version