Teams is used to spread malware
The attack on Microsoft Teams is conducted with social engineering techniques to spread trojans on a platform with over 250…
The attack on Microsoft Teams is conducted with social engineering techniques to spread trojans on a platform with over 250…
BlackCat claims the early February attack on Swissport, a Swiss company operating in the air transport sector. On February 3,…
Chrome has a high-severity vulnerability that has already been exploited by attackers. You need to update Google’s browser right away…
The US communications provider iBasis has fallen victim to a ransomware attack. A cyberattack on the US company iBasis may…
A new Pegasus case broke out in Israel after newspapers reported another massive cyber espionage operation against politicians and journalists.…
Security Startups will be the most innovative and interesting companies in the next years. Although cybersecurity can only be optimized…
An incident is security relevant if one or more questions are answered positively: Is personal data / employee data affected…
There are four key components of a computer security incident response plan: Preparation: Preparing stakeholders on the procedures for handling…
The requirements for a Password Manager are extremly important. You must always access the server to retrieve stored passwords at…
As soon as a CISO arrives in the company, carry out an assessment to understand which are the most relevant…