Infrastructure Cyberattacks, AI-Powered Threats Pummel Africa News Convincing phishing emails, synthetic identities, and deepfakes all have been… rooter March 7, 2024 1 min read 0
Tips on Managing Diverse Security Teams News The better a security team works together, the bigger the… rooter March 7, 2024 1 min read 0
Biometrics Regulation Heats Up, Portending Compliance Headaches News A growing thicket of privacy laws regulating biometrics is aimed… rooter March 7, 2024 1 min read 0
CryptoChameleon Attackers Target Apple, Okta Users With Tech Support Gambit News A sophisticated threat actor using an MO similar to Scattered… rooter March 7, 2024 1 min read 0
NIST Cybersecurity Framework 2.0: 4 Steps to Get Started News The National Institute of Standards and Technology (NIST) has revised… rooter March 7, 2024 1 min read 0
Taiwan’s Biggest Telco Breached by Suspected Chinese Hackers News Stolen data from Chunghwa Telecom — including government-related details —… rooter March 7, 2024 1 min read 0
Chinese APT Developing Exploits to Defeat Already Patched Ivanti Users News More bad news for Ivanti customers: soon, even if you've… rooter March 7, 2024 1 min read 0
Biden Administration Unveils Data Privacy Executive Order News The presidential move orders a variety of different departments and… rooter March 7, 2024 1 min read 0
Inspiring Inclusion: Sophos Celebrates International Women’s Day 2024 News Friday, March 8 is International Women’s Day and this year… rooter March 7, 2024 1 min read 0
Cloud Apps Make the Case for Pen-Testing-as-a-Service News Applications are increasingly distributed, expanding companies' cloud attack surfaces and… rooter March 6, 2024 1 min read 0