Conduct Assessments
To address the subject of information security appropriately, an organization must analyze the status of its own information security. In…
To address the subject of information security appropriately, an organization must analyze the status of its own information security. In…
Three vulnerabilities plague Samba, including one critical and one high severity vulnerability. Specifically, remote attackers can exploit them to execute…
The intentions of the Biden Administration to strengthen the US cyber security, following the SolarWinds, Microsoft and Colonial Pipeline cases,…
A new variant of the banking trojan BRATA has been identified and, thanks to increasingly advanced features, it is able…
A new variant of the njRAT trojan is targeting many users with a malspam campaign aimed at stealing banking login…
Private equity firm Symphony Technology Group (STG) has announced the new name of the company merged from McAfee Enterprise and…
Multinational impact on more than 500,000 extremely vulnerable people, putting aid programmes for families in war zones at risk. The…
Cisco Talos has confirmed in the past few days that malicious users are using remote access trojans (RATs) of the…
In this section, we present a curated selection of the top 7 ebooks on cybersecurity, all of which are up-to-date…
Cybersecurity is nowadays also one of the major challenges in the modern world. Probably one of the most difficult topics.…