When the popular safeguarding tool is anything but
How to stave off software supply chain attacks Webinar A software supply chain attack is a hugely painful form of...
How to stave off software supply chain attacks Webinar A software supply chain attack is a hugely painful form of...
<div> <div> <div> <div> <div> <p><strong>LEESBURG, Va. – May 31</strong><strong>, 2023</strong> – Cofense, a global email security company and leading...
Data was exfiltrated using bug in the company’s email security gateway appliances that was exploited since October 2022. Article Link:...
Recently, the Eclypsium platform began detecting suspected backdoor-like behavior within Gigabyte systems in the wild. These detections were driven by...
Montana has become the latest state to approve legislation aimed at strengthening data privacy protections, joining eight other states that...
Ping Identity announced PingOne Protect, a new fraud detection and risk management service to prevent account takeover and fake accounts...
Microsoft has shared details of a now-patched flaw in Apple macOS that could be abused by threat actors with root...
Zyxel has patched a high-severity authenticated command injection vulnerability (CVE-2023-27988) in some of its network attached storage (NAS) devices aimed...
Attackers have been leveraging the new "file archive in the browser" phishing technique that enables the creation of realistic phishing...
Netskope announced an integration between Netskope’s Intelligent Security Service Edge (SSE) platform and Amazon Security Lake from AWS. Amazon Security...