CrowdStrike: Attackers focusing on cloud exploits, data theft
Image: Ar_TH/Adobe Stock CrowdStrike, a cybersecurity firm that tracks the activities of global threat actors, reported the largest increase in...
Category Added in a WPeMatico Campaign
Image: Ar_TH/Adobe Stock CrowdStrike, a cybersecurity firm that tracks the activities of global threat actors, reported the largest increase in...
by Paul Ducklin Even if you’re not entirely sure what a TPM is, you’ll probably know that if you want...
Governance & Risk Management , IT Risk Management , Standards, Regulations & Compliance Holding Vendors Liable for Insecure Apps Fuels...
Ethical hacking is a great skill to learn with new cyber threats on the rise. Learn how to fight back...
Image: Michael Traitov/Adobe Stock In the first cybersecurity framework since 2018, the White House has released to the wild its...
by Naked Security writer You’ve almost certainly heard of the ransomware family known as DoppelPaymer, if only because the name...
Image: Tada Images/Adobe Stock LastPass was hacked twice last year by the same actor; one incident was reported in late...
Image: klss777/Adobe Stock Endor Labs, a software firm that facilitates the security and maintenance of open-source software, has released a...
by Paul Ducklin The US Cybersecurity and Infrastructure Security Agency (CISA), which dubs itself “America’s Cyber Defense Agency”, has just...
In this blog, I will introduce discussions from S4 over several posts. The first installment will cover two topics from...
Organizations subject to government regulations can gain more control over their own security. Image: Pixabay Google Workspace has expanded its...
Image: Song_about_summer/Adobe Stock 1Password Chief Product Officer Steve Won says credentials theft is ubiquitous and getting worse. LastPass can vouch...
Andy Warner, Google Trust Services, and Carl Krauss, Product Manager, Google DomainsWe’re excited to announce changes that make getting Google...
by Paul Ducklin A ROGUES’ GALLERY Rogue software packages. Rogue “sysadmins”. Rogue keyloggers. Rogue authenticators. No audio player below? Listen...
Security recommendations and Trend Micro solutions Email-related threats are becoming increasingly sophisticated and harder to spot. Back in the day,...