Advanced analytics and computer technology has made data one of the most valuable resources a company can have. Many manufacturers, as a result, are turning...
Satnam Narang, Staff Research Engineer, Tenable says, “The motivation of cybercriminals is primarily financial.” Verizon released its 2020 Data Breach Investigations Report (DBIR) recently. Satnam...
Taking the opportunity of COVID-19 pandemic, cyber criminals are looking at exploiting less secured companies. As per NTT Ltd.’s 2020 Global Threat Intelligence Report (GTIR)...
Filip Cotfas, Sales and Business Development Manager, CoSoSys As the COVID-19 pandemic spreads throughout the world, more and more companies are asking their employees to...
Research report outlines advanced attack scenarios and recommendations for OT operators Trend Micro Incorporated has released research describing how advanced hackers could leverage unconventional, new...
Phishing and Trojans: In January, McAfee observed the emergence of a phishing campaign using a strain of the Ursnif banking Trojan commonly used to steal usernames, passwords...
As defined by most of the scholastic articles, the traditional security architecture is built on ‘castle-and-moat’ concept, but things are gradually changing – a new...
The organization issues advisory for Desktop and web version of Microsoft Teams application In its advisory, CERT mentioned that in email extortion campaign, the scammers...
Fleeceware has been installed around 3.6 million times on the Apple App Store SophosLabs report, Don’t Let Fleeceware Sneak into Your iPhone, shows how Apple...