Top Malware Trends of April
<div> <div> <div> <div> <div> <p>By Schyler Gallant, Alex Geoghagan, Cobi Aloia, Cofense Phishing Defense Center</p><p>The Cofense Phishing Defense Center...
<div> <div> <div> <div> <div> <p>By Schyler Gallant, Alex Geoghagan, Cobi Aloia, Cofense Phishing Defense Center</p><p>The Cofense Phishing Defense Center...
IBM has acquired Polar Security, an innovator in technology that helps companies discover, continuously monitor and secure cloud and SaaS...
Fraudsters are trying out a new approach to convince companies to pay bogus invoices: instead of hijacking existing email threads,...
Asymmetry Finance today announces the launch of safETH, joining the crowded liquid Ethereum staking market.
Earlier this year, we blogged about an incident where we mistakenly throttled a customer due to internal confusion about a...
Building the large language models (LLMs) and diffusion models that power generative AI requires massive infrastructure. The most obvious component...
Countless smartphones seized in arrests and searches by police forces across the United States are being auctioned online without first...
Operational technology (OT) cybersecurity is a challenging but critical aspect of protecting organizations' essential systems and resources. Cybercriminals no longer...
The threat actors behind the CopperStealer malware resurfaced with two new campaigns in March and April 2023 that are designed...
While digitization has simplified many organizational tasks, it has simultaneously made other facets of business more complex, including an ever-growing...