No menu items!
No menu items!
More

    News

    5 Steps to vCISO Success for MSPs and MSSPs

    Feb 07, 2024The Hacker NewsRisk Management / Cybersecurity 2024 will be the year of the vCISO. An incredible 45% of MSPs and MSSPs are...

    Chinese Hackers Exploited FortiGate Flaw to Breach Dutch Military Network

    Feb 07, 2024NewsroomCyber Espionage / Network Security Chinese state-backed hackers broke into a computer network that's used by the Dutch armed forces by targeting...

    U.S. Imposes Visa Restrictions on those Involved in Illegal Spyware Surveillance

    Feb 06, 2024NewsroomSurveillance / Privacy The U.S. State Department said it's implementing a new policy that imposes visa restrictions on individuals who are linked...

    Hackers Exploit Job Boards, Stealing Millions of Resumes and Personal Data

    Feb 06, 2024NewsroomDark Web / Cybercrime Employment agencies and retail companies chiefly located in the Asia-Pacific (APAC) region have been targeted by a previously...

    Experts Detail New Flaws in Azure HDInsight Spark, Kafka, and Hadoop Services

    Feb 06, 2024NewsroomVulnerability / Cloud Security Three new security vulnerabilities have been discovered in Azure HDInsight's Apache Hadoop, Kafka, and Spark services that could...

    Fake Facebook Job Ads Spreading ‘Ov3r_Stealer’ to Steal Crypto and Credentials

    Feb 06, 2024NewsroomSocial Engineering / Malvertising Threat actors are leveraging bogus Facebook job advertisements as a lure to trick prospective targets into installing a...

    How a $10B Enterprise Customer Drastically Increased their SaaS Security Posture with 201% ROI by Using SSPM

    SaaS applications are the darlings of the software world. They enable work from anywhere, facilitate collaboration, and offer a cost-effective alternative to owning...

    Recent SSRF Flaw in Ivanti VPN Products Undergoes Mass Exploitation

    Feb 06, 2024NewsroomCybersecurity / Vulnerability A recently disclosed server-side request forgery (SSRF) vulnerability impacting Ivanti Connect Secure and Policy Secure products has come under...

    SASE-based XDR from Cato Networks

    Companies are engaged in a seemingly endless cat-and-mouse game when it comes to cybersecurity and cyber threats. As organizations put up one defensive...

    Latest articles

    spot_imgspot_img