Supply Chain Risk from Gigabyte App Center Backdoor
Recently, the Eclypsium platform began detecting suspected backdoor-like behavior within Gigabyte systems in the wild. These detections were driven by...
Recently, the Eclypsium platform began detecting suspected backdoor-like behavior within Gigabyte systems in the wild. These detections were driven by...
Montana has become the latest state to approve legislation aimed at strengthening data privacy protections, joining eight other states that...
Ping Identity announced PingOne Protect, a new fraud detection and risk management service to prevent account takeover and fake accounts...
Microsoft has shared details of a now-patched flaw in Apple macOS that could be abused by threat actors with root...
Zyxel has patched a high-severity authenticated command injection vulnerability (CVE-2023-27988) in some of its network attached storage (NAS) devices aimed...
Attackers have been leveraging the new "file archive in the browser" phishing technique that enables the creation of realistic phishing...
Netskope announced an integration between Netskope’s Intelligent Security Service Edge (SSE) platform and Amazon Security Lake from AWS. Amazon Security...
Small and medium businesses (SMBs) are not exempt from being targeted by advanced persistent threat (APT) actors, according to Proofpoint...
BBC reports that nearly 90 organizations have notified the UK's Information Commissioners Office regarding data breaches concerning major business outsourcing...
Mirantis announced Lens Control Center, to enable large businesses to centrally manage Lens Pro deployments by standardizing configurations, consolidating billing,...