Putting Ransomware Gangs Out of Business With AI
Organizations need to take matters into their own hands with a new approach.
Organizations need to take matters into their own hands with a new approach.
A financially-motivated actor dubbed 'Elephant Beetle' is stealing millions of dollars from organizations worldwide using an arsenal of over 80…
A new Zloader campaign exploits Microsoft's e-signature code verification to steal user credentials from over two thousand victims in 111…
The Falcon sensor uses Intel PT telemetry to identify suspicious operations associated with hard-to-detect exploit techniques.
Microsoft says vulnerabilities present a "real and present" danger, citing high volume of scanning and attack activity targeting the widely…
The US Federal Trade Commission (FTC) has warned today that it will go after any US company that fails to protect its…
The Software Composition Analysis leader now offers a remediation preset for WhiteSource Renovate and Enterprise, enabling users to identify and…
2021 is over, and we can look forward to a hopefully healthier, safer, and more normal 2022. However, it was…
Once the dust settles on Log4j, many IT teams will brush aside the need for the fundamental, not-exciting need for…
The Conti ransomware gang is the first ransomware operation exploiting the Log4Shell vulnerability to target VMware vCenter Servers. Conti ransomware […] The…