5 Best Practices for Building Your Data Loss Prevention Strategy
The entire security team should share in the responsibility to secure sensitive data.
The entire security team should share in the responsibility to secure sensitive data.
Access tokens for other Teams users can be recovered, allowing attackers to move from a single compromise to the ability…
The Federal Bureau of Investigation (FBI) has issued an alert about hackers targeting healthcare payment processors to route payments to…
Security analysts have found a severe security vulnerability in the desktop app for Microsoft Teams that gives threat actors access…
By Dirk Schrader, Resident CISO (EMEA) and VP of Security Research, Netwrix A new vulnerability in the Microsoft […] The…
Apple is releasing iOS 16 today with new features to boost iPhone users' security and privacy, including Lockdown Mode and…
Apple released iOS 16 today with new features to boost iPhone users' security and privacy, including Lockdown Mode and Security…
The threat-intelligence and cyberdefense company company will join Google Cloud and retain its brand name.
By Goh Eng Choon, President for Cyber, ST Engineering From sabotaging, stealing and destroying valuable enterprise data to […] The…
A new attack technique called 'GIFShell' allows threat actors to abuse Microsoft Teams for novel phishing attacks and covertly executing…