Researchers have recently built a report based on interviews conducted with business and cybersecurity leaders from large enterprises across the world, that sheds light on why technology vendors are not incentivized to deliver products that are... Read more
Public cloud infrastructure has become cybercriminals’ one of the favorite attack surfaces, due to the convergence of technology and tech-enabled devices. Researchers have recently warned about a minimum of three massive phishing campaigns targe... Read more
This year has proved to be an opportune one for threat actors and it has been noticed that several among them have accelerated their malicious activities. While they have been making merry, a prominent ransomware group is in news again, this tim... Read more
Earlier in the month, it has been noticed that Emotet has switched to a new template pretending to be messages from Microsoft office stating that Microsoft Word needs to be updated to add a new feature. Emotet is a malware infection that spreads... Read more
With the spread of the pandemic and its effects over the enterprise’ prism of life, the job of a security expert has become even more important, since security solutions are no longer just a tool to counter cyber threats but they act as a cataly... Read more