Emerging Attacker Exploit: Microsoft Cross-Tenant Synchronization
Aug 10, 2023The Hacker NewsThreat Detection / Attack Signal Attackers continue to target Microsoft identities to gain access to connected...
Aug 10, 2023The Hacker NewsThreat Detection / Attack Signal Attackers continue to target Microsoft identities to gain access to connected...
As companies continue to shift towards the cloud, platform engineering has emerged as a practice for organizations to efficiently and...
Ransomware attacks continue to hit record levels with 434 attacks in June 2023, a 221% increase on the same period...
As the volume of security breaches continue to rise, now is the time to move from legacy multi-factor authentication (MFA)...
Our first focus is to continue with the integration of Bombardier Transportation. We want to finish it as quickly as possible...
Jul 14, 2023The Hacker NewsSaaS Security / Cybersecurity As security practices continue to evolve, one primary concern persists in the...
Jul 13, 2023THNLinux / Vulnerability In a sign that cybersecurity researchers continue to be under the radar of malicious actors,...
Jul 11, 2023THNCryptocurrency / Cloud Security Cloud environments continue to be at the receiving end of an ongoing advanced attack...
Cyberattacks continue to grow in quantity and sophistication at the same time that organizations’ systems become increasingly complex. Security teams,...
Data volumes continue to grow, making it increasingly difficult to deal with the explosive growth. Huawei predicts that by 2030,...
As the business environment becomes increasingly connected, organizations' attack surfaces continue to expand, making it challenging to map and secure...
Continue reading the Ransomware Spotlight series: Ransomware is a ‘noisy’ threat. When it hits, there’s no hiding it: attackers lock...