Cyber inequality crisis is weakening our global defences
By Deryck Mitchelson, Field CISO EMEA, Check Point The disparity in cyber defense budgets is significantly contributing to a deteriorating…
By Deryck Mitchelson, Field CISO EMEA, Check Point The disparity in cyber defense budgets is significantly contributing to a deteriorating…
Incident Response (IR) shapes how effectively an organization can survive and recover from a cyberattack. The post Incident Response –…
Microsoft announced that it caught Chinese, Russian, and Iranian hackers using its AI tools—presumably coding tools—to improve their hacking abilities.…
The recent sophisticated breach of Microsoft Executive emails is a stark reminder that all of us can be targeted with…
The Cactus ransomware gang claims the theft of 1.5TB of data from the Energy management and industrial automation firm Schneider…
An international law enforcement operation codenamed ‘Operation Cronos’ led to the disruption of the LockBit ransomware operation. A joint law…
The Android banking trojan Anatsa resurged expanding its operation to new countries, including Slovakia, Slovenia, and Czechia. In November 2023,…
The European Court of Human Rights has ruled that breaking end-to-end encryption by adding backdoors violates human rights: Seemingly most…
This post will answer the question – What is the best country for VPN anonymity? A VPN protects your data…
The Raccoon Infostealer operator, Mark Sokolovsky, was extradited to the US from the Netherlands to appear in a US court.…