Cato Networks introduces device context-driven access control to tackle remote working and BYOD risks
SASE platform provider Cato Networks has introduced a new risk-based application access control for combatting security threats and productivity challenges posed by remote working and...
Hackers Using Fake Police Data Requests against Tech Companies
Brian Krebs has a detailed post about hackers using fake police data requests to trick companies into handing over data. Virtually all major technology companies...
Retailer The Works Closes Stores After Cyber-Attack
Suspected ransomware to blame but no card details taken Read More
Cyber threats increasingly target video games – The metaverse is next
Photo by Adi Goldstein on Unsplash This blog was written by an independent guest blogger. The technical infrastructure of video games requires a significant level of access to...
Post Title
Multiple vulnerabilities have been discovered in the Google Android operating system (OS), the most severe of which could allow for remote code execution. Android is...
Global APT Groups Use Ukraine War for Phishing Lures
Cyber-espionage campaigns make the most of big news event Read More
USN-5364-1: Waitress vulnerability
It was discovered that Waitress incorrectly handled certain requests. An attacker could possibly use this issue to expose sensitive information. Read More
5 ways to improve security hygiene and posture management
As management guru Peter Drucker famously said: ‘You can’t manage what you can’t measure.’ That’s certainly true when it comes to security hygiene and posture...
Real-time is where the cybersecurity risk is
I don’t know how many times I’ve heard cybersecurity professionals say something like, “Not having multi-factor authentication is a huge risk for our organization.” The...
WhatsApp ‘Voice Message’ Is an Info-Stealing Phishing Attack
Armorblox warns of new campaign using Russian domain Read More