News

Explore the future of cybersecurity in the era of AI; from enhanced cyberattack detection to potential offensive threats. Discover key industry trend ...
Driven by the lucrative nature of ransomware and the availability of AI-driven ransomware toolkits, the number of incidents ...
Credential-based attacks are the top threat to SMBs. Strengthen your cybersecurity posture with practical identity-first defense strategies.
Tea, a dating discussion app that recently suffered a high-profile cybersecurity breach, announced late Monday that some direct messages were also accessed in the incident. The app — designed to ...
NordVPN is already a great Android VPN, and now the company aims to warn you about spam calls on mobile devices.
Orange, a French telecommunications company and one of the world's largest telecom operators, revealed that it detected a breached system on its network on Friday.
Maro, the cognitive security platform company created to empower security leaders to manage human risk proactively, announced today it successfully raised $4.3 million from Downing Capital Group. With ...
Short Messaging Service (SMS) protocol might be going the way of the rotary dial, and there are good reasons to show the ...
Allianz has more than 125mn customers globally. Through its Allianz Commercial arm, it offers insurance against cyber attacks and advises companies on minimising their exposure to the threat.
According to Verizon's 2020 Data Breach Investigations Report (DBIR), over 80% of data breaches are caused by weak or stolen ...
Identity and Access Control: Services like AWS Identity and Access Management (IAM) enable granular permission setting for cloud resources and APIs. This includes establishing password policies, ...
A software vulnerability is a weak structural design element that can be weaponized by malevolent actors, to compromise the system’s functionality.