Remote Utilities Exploitation: New Phishing Campaign by the UAC-0096 Group Targeting Ukrainian Organizations
Hot on the heels of the massive email distribution in the recent malicious campaign targeting Ukrainian state bodies and leveraging […]
Hot on the heels of the massive email distribution in the recent malicious campaign targeting Ukrainian state bodies and leveraging […]
Building Team Resilience and Fortitude While Facing the Challenges of Wartime: Insights from a Shared Experience In this second part
Vulnerability Details: Microsoft Critical Patches Released – Patch Now Multiple vulnerabilities have been discovered in Microsoft products, the most severe
By Tyler Farrar, CISO, Exabeam According to the Exabeam State of the SIEM survey, security professionals remain confident in the
By Alisdair Faulkner, CEO at Darwinium Cybersecurity and fraud teams have been locked in a technology arms race with their
By Jack Viljoen, Head of Marketing, Prodinity In recent years, there has been an exponential rise in the number of
Remcos Trojan (Remote Control and Surveillance) is frequently delivered by threat actors leveraging phishing attack vectors. The malware currently reemerges
Leaks of API keys and other secrets. The industry has been abuzz with news about attacks – and the ongoing
Why biometric security is crucial in a post-quantum world By Nils Gerhardt, Chief Technology Officer for Utimaco Many are saying
Abbott Ekta Sirwani https://www.linkedin.com/in/ekta-sirwani/ Absolute Christy Wyatt https://www.linkedin.com/in/christywyatt/ Alert Logic Sydna Kelley https://www.linkedin.com/in/sydnakelley/ Alta Associates Joyce Brocaglia https://www.linkedin.com/in/joycebrocaglia/ AppEsteem Corporation