A malicious Android app that steals Facebook credentials has been installed over 100,000 times via the Google Play Store, with the app still available to download....
Microsoft says they are investigating claims that the Lapsus$ data extortion hacking group breached their internal Azure DevOps source code repositories and stolen data. Unlike many...
Web malware (47%) and ransomware (42%) now top the list of security threats that organizations are most concerned about. Yet despite the growing risks, just 27% have...
Panaseer shares data on actions enterprises are willing to take to solve the escalating cyber insurance crisis. In recent years the cyber landscape has been dominated by a...
A survey by ionir shows that 60% of respondents are running stateful applications on Kubernetes, and of those who aren’t already, 50% plan to do so in...
The global password management market size is expected to reach $2.9 billion by 2027, rising at a market growth of 20.7% CAGR during the forecast period, according to...
An advanced threat actor has been spotted using distinctive, novel methods to backdoor French entities in the construction, real estate, and government industries. How the attack...
The anatomy of Log4Shell By now, we are all familiar with the fact that Log4Shell is just about as critical as a critical vulnerability can get...
The migration of everything to the cloud and corresponding rise of cyberattacks, ransomware, identity theft and digital fraud make clear that secure access to computer systems is essential....
In this interview with Help Net Security, Den Jones, CSO at Banyan Security, explains the benefits of implementing passwordless authentication and the process every organization has to go through...