Gurucul announced the results of a Black Hat USA 2022 security professionals survey with respondents indicating that insider threats were the most difficult type of attack...
Orca Security released the 2022 State of the Public Cloud Security Report, which provides important insights into the current state of public cloud security and where the most...
Security and compliance challenges are a significant barrier to most organizations’ innovation strategies, according to CloudBees. The survey also reveals agreement among C-suite executives that a...
With international tensions heightened as we enter month eight of the war between Russia and Ukraine, it’s clear that a new era of intensifying state-sponsored attacks...
The Zoom video conference platform was down and experienced an outage preventing users from logging in or joining meetings. According to an incident posted on Zoom’s...
https://player.vimeo.com/video/747925665?h=72853f5059&badge=0&autopause=0&player_id=0&app_id=58479&dnt=1 Every organization that interacts with customers or consumers via web and mobile applications, and also as they transition to a hybrid workspace, means that they are...
An Iranian-aligned hacking group uses a new, elaborate phishing technique where they use multiple personas and email accounts to lure targets into thinking its a realistic...
Security researchers have developed an implementation of the Sysinternals PsExec utility that allows moving laterally in a network using a single, less monitored port, Windows TCP...
https://player.vimeo.com/video/745365684?h=8e358ea0f9&badge=0&autopause=0&player_id=0&app_id=58479&dnt=1 Today’s harsh reality is that incident response based on manual efforts is no longer successful for security teams. Staying on top of thousands of daily security alerts...
In a world where we can no longer trust anyone, zero trust security has picked up momentum, especially since 2018 when NIST published Implementing a Zero Trust...