Annual ThreatLabz Report reveals phishing-as-a-service as the key source of attacks across critical industries and consumers globally; underscores urgency to…
Cloud security is constantly evolving and consistently different than defending on-premises assets. Denonia, a recently discovered serverless cryptominer drives home…
Can Your Cybersecurity Culture Stand Up to the Latest Spear Phishing Techniques?
By Josh Yavor, Chief Information Security Officer, Tessian Gone are the days of bulk spear phishing attacks, where […] The…
Microsoft Patches Pair of Dangerous Vulnerabilities in Azure PostgreSQL
Flaws gave attackers a way to access other cloud accounts and databases, security vendor says.
Microsoft fixes ExtraReplica Azure bugs that exposed user databases
Microsoft has addressed a chain of critical vulnerabilities found in the Azure Database for PostgreSQL Flexible Server that could let…
The Security Vulnerabilities Facing Remote Workforces
An organization’s security is only as good as its weakest link By Daniel Hofmann, CEO, Hornetsecurity With work […] The…
Docker servers hacked in ongoing cryptomining malware campaign
Docker APIs on Linux servers are being targeted by a large-scale Monero crypto-mining campaign from the operators of the Lemon_Duck…
New Zscaler Research Shows Over 400% Increase in Phishing Attacks With Retail and Wholesale Industries at Greatest Risk
Annual ThreatLabz Report reveals phishing-as-a-service as the key source of attacks across critical industries and consumers globally; underscores urgency to…
Anti-Fraud Partnership Brings Confidential Computing to Financial Services
Intel, FiVerity, and Fortanix team up to launch an AI-driven fraud detection platform into a confidential computing environment.
Denonia Malware Shows Evolving Cloud Threats
Cloud security is constantly evolving and consistently different than defending on-premises assets. Denonia, a recently discovered serverless cryptominer drives home…
Lightspin Secures Infrastructure as Code Files with New GitHub Integration
Users can scan GitHub repositories and detect misconfigurations, exposed secrets and other security issues.
Protecting Critical Infrastructure from Cyberattacks Essential if U.S. is to Remain a Superpower
By Jeff Engle, Chairman and President of Conquest Cyber The playbook for geopolitical dominance is being re-written thanks […] The…