
Increasing trend of threat actors seeking assistance to place counterfeit EDRs, on underground forums. EDRs can be exploited to obtain sensitive information from service providers.
More than 1 in 5 organizations have experienced a security incident due to shadow IT. What are the risks associated and how do we avoid them?
It is essential to have quantifiable metrics to gauge the quality of web apps. Here is a list of 6 quality metrics to optimize web apps.
59% of companies have experienced data breach due to third-party vendors. Given the level of access most vendors have to an organization’s network, traditional risk management frameworks fall short.
Senior executives are 12 times more likely to be targets of social incidents, and 9 times more likely to be targets of social breaches.
There has been a precipitous rise in the number of COVID-themed data breaches. Here are security practices that can defend your organization.
Here is a consolidated list of popular open source threat intel resources that can help you combat COVID-themed cyber attacks.
Although the security of IoT devices demands immediate attention, the abundance of these devices has resulted in the lack thereof.
When it comes to cybersecurity, AI is changing how we detect and respond to threats. However, with the benefits, comes the risk of the potential misuse of AI capabilities. Is the primary catalyst for cybersecurity, also a threat to it?
The Reserve Bank of India (RBI) has issued comprehensive guidelines too ensure that Indian banks function in a cyber-resilient environment.
Scammers have repackaged their scams, that are delivered to us, via other channels. The new schemes are so convincing that we reach out to them.
Sign up for our Daily Cyber Brief, and be the first to receive the latest cyber news and threat alerts, from across the world.