Google Workspace has quickly become the productivity backbone for businesses worldwide, offering an all-in-one suite with email, cloud storage a...
Category: Attack
Nov 22, 2024Ravie LakshmananCyber Espionage / Malware Threat actors with ties to Russia have been linked to a cyber espionage campaign aimed a...
Meta Platforms, Microsoft, and the U.S. Department of Justice (DoJ) have announced independent actions to tackle cybercrime and disrupt services...
Nov 22, 2024Ravie LakshmananArtificial Intelligence / Malware Cybersecurity researchers have discovered two malicious packages uploaded to the...
Nov 21, 2024Ravie LakshmananCyber Espionage / Malware The China-aligned advanced persistent threat (APT) actor known as Gelsemium has been obs...
Nov 21, 2024Ravie LakshmananVulnerability / Cyber Attack As many as 2,000 Palo Alto Networks devices are estimated to have been compromised as...
As a relatively new security category, many security operators and executives I've met have asked us "What are these Automated Security Validati...
Privileged access management (PAM) plays a pivotal role in building a strong security strategy. PAM empowers you to significantly reduce cyberse...
Nov 21, 2024Ravie LakshmananMalware / Cyber Fraud Threat actors with ties to the Democratic People's Republic of Korea (DPRK) are impersonatin...
New research has uncovered more than 145,000 internet-exposed Industrial Control Systems (ICS) across 175 countries, with the U.S. alone account...