Red Cross under cyberattack
Multinational impact on more than 500,000 extremely vulnerable people, putting aid programmes for families in war zones at risk. The…
Multinational impact on more than 500,000 extremely vulnerable people, putting aid programmes for families in war zones at risk. The…
Cisco Talos has confirmed in the past few days that malicious users are using remote access trojans (RATs) of the…
In this section, we present a curated selection of the top 7 ebooks on cybersecurity, all of which are up-to-date…
Cybersecurity is nowadays also one of the major challenges in the modern world. Probably one of the most difficult topics.…
The basic principle of Zero Trust is to regulate and authenticate privileged access to data and systems. Zero Trust encourages…
This week Microsoft released the first Patch of the year with updates addressing nearly 100 security vulnerabilities, including six zero-day…
Windows, Linux and macOS users are in the crosshairs of SysJoker: the cross-platform malware has been active since the second…
As individuals store and manipulate more data, they become more susceptible to major data breaches. Inexpensive USB flash drives allow…
Detecting existing security gaps in corporate networks quickly and reliably has become impossible manually due to vast volumes of data.…
The Lockheed Martin’s kill chain model as a threat assessment and prevention tool is no longer adaptable to the new…