No menu items!
No menu items!
More

    News

    Are Your SaaS Backups as Secure as Your Production Data?

    Conversations about data security tend to diverge into three main threads: How can we protect the data we store on our on-premises or cloud...

    Chinese APT Group’s Stealthy Tactics Exposed

    May 23, 2024NewsroomCyber Espionage / Network Security Governmental entities in the Middle East, Africa, and Asia are the target of a Chinese advanced persistent...

    Ivanti Patches Critical Remote Code Execution Flaws in Endpoint Manager

    May 23, 2024NewsroomEndpoint Security / Vulnerability Ivanti on Tuesday rolled out fixes to address multiple critical security flaws in Endpoint Manager (EPM) that could...

    Achieve security compliance with Wazuh File Integrity Monitoring

    File Integrity Monitoring (FIM) is an IT security control that monitors and detects file changes in computer systems. It helps organizations audit important...

    Microsoft Phases Out VBScript for JavaScript and PowerShell

    May 23, 2024NewsroomEndpoint Security / Data Privacy Microsoft on Wednesday outlined its plans to deprecate Visual Basic Script (VBScript) in the second half of...

    Researchers Warn of Chinese-Aligned Hackers Targeting South China Sea Countries

    Cybersecurity researchers have disclosed details of a previously undocumented threat group called Unfading Sea Haze that's believed to have been active since 2018. The...

    Rockwell Advises Disconnecting Internet-Facing ICS Devices Amid Cyber Threats

    May 22, 2024NewsroomICS Security / Vulnerability Rockwell Automation is urging its customers to disconnect all industrial control systems (ICSs) not meant to be connected...

    The Ultimate SaaS Security Posture Management Checklist, 2025 Edition

    Since the first edition of The Ultimate SaaS Security Posture Management (SSPM) Checklist was released three years ago, the corporate SaaS sprawl has...

    GHOSTENGINE Exploits Vulnerable Drivers to Disable EDRs in Cryptojacking Attack

    Cybersecurity researchers have discovered a new cryptojacking campaign that employs vulnerable drivers to disable known security solutions (EDRs) and thwart detection in what's...

    Latest articles

    spot_imgspot_img