Executive summary In today’s complex IT environments, Network Detection and Response (NDR) solutions are crucial to identify, assess, and respond to cyberthreats. Many NDR solutions rely...
CloudBolt Software released its latest research report, examining industry sentiment in specific dimensions of hybrid cloud/multi-cloud, and aiming to uncover unmet cloud needs that hinder cloud innovation....
In a global consumer survey, Axway finds that almost 60% of people believe it’s worth allowing companies to access their personal data if it means a better user...
Wednesday’s denial-of-service attacks on government, financial sites resemble earlier ones attributed to Russia. Various financial and government websites in Ukraine were temporarily disabled on Wednesday by...
European Union countries have reportedly agreed to offer Ukraine help in fighting against potential Russian cyber-attacks. The support is apparently being provided via the EU’s Cyber Rapid Response...
ANALYSIS This year, India should become the latest large economy to introduce a comprehensive data privacy law. Until now, the personal data of India’s population of 1.4...
A flaw in Google Groups has netted a security researcher $3,133 after he discovered that the unsubscribe feature could be abused to remove members without their...
A devious, new phishing technique allows adversaries to bypass multi-factor authentication (MFA) by secretly having victims log into their accounts directly on attacker-controlled servers using the...
Threat analysts have observed a new wave of attacks installing Cobalt Strike beacons on vulnerable Microsoft SQL Servers, leading to deeper infiltration and subsequent malware infections....
The Ukrainian cyberpolice have arrested a group of phishing actors who managed to steal payment card data from at least 70,000 people after luring them to fake...