QNAP is warning customers again to secure their Internet-exposed Network Attached Storage (NAS) devices to defend against ongoing and widespread attacks…
By Eyal Elyashiv, CEO, Cynamics Most network detection and response solutions and network performance monitoring and diagnostic tools are using […] The…
Cybersecurity Experts Share Their Predictions for 2022
By Danny Lopez, CEO of Glasswall The year 2021 raised many major cybersecurity concerns including the rise in […] The…
Fighting Supply Chain Email Attacks With AI
Supply chain account takeover is the most pressing issue facing email security today, but artificial intelligence can head off such…
Let’s Encrypt is revoking lots of SSL certificates in two days
Let's Encrypt will begin revoking certain SSL/TLS certificates issued within the last 90 days starting January 28, 2022. The move…
QNAP warns of new DeadBolt ransomware encrypting NAS devices
QNAP is warning customers again to secure their Internet-exposed Network Attached Storage (NAS) devices to defend against ongoing and widespread attacks…
Scary Fraud Ensues When ID Theft & Usury Collide
What's worse than finding out that identity thieves took out a 546 percent interest payday loan in your name? How…
Florida shuts monoclonal antibody treatment sites after FDA sets new limits
The Florida Department of Health announced that it is closing all monoclonal antibody treatment sites in the state after the…
Three Key Facts About AI-Driven Network Detection and Response
By Eyal Elyashiv, CEO, Cynamics Most network detection and response solutions and network performance monitoring and diagnostic tools are using […] The…
Google Drive flags nearly empty files for ‘copyright infringement’
Users were left startled as Google Drive's automated detection systems flagged a nearly empty file for copyright infringement. The file, according to…
Trickbot Injections Get Harder to Detect & Analyze
The authors of the infamous malware family have added measures for better protecting malicious code injections against inspection and research.
Protecting Critical Infrastructure Against Cyberattacks
Understanding how attackers get in is the critical first step to mounting an effective defense. By Sean Deuby […] The…