Sunday, October 1, 2023
HomeCybersecurity

Cybersecurity

Protecting Assets in a Remote-First and Potentially Hostile World

By Chester Wisniewski With both persistent attacks and post-pandemic remote work here to stay, modern security solutions must...

IT Teams at Risk of Being Caught Unawares by New OT Threat-Microsoft Report

Microsoft’s latest Cyber Signals report highlights how cybercriminals are using Operational Technology (OT) as gateways into an...

Sophos Managed Detection and Response (MDR) Service Grows Customer Base by 33%

Sophos today announced that its industry-first vendor-agnostic Managed Detection and Response (MDR) service has grown its customer...

Cyberattackers Leveraged More Than 500 Unique Tools and Tactics in 2022, Sophos

Sophos today released its Active Adversary Report for Business Leaders, an in-depth look at the changing behaviors...

Liquid C2 launches third Cyber Security Fusion Centre in Zambia

Liquid C2, a business of Cassava Technologies, a pan-African technology group, has launched a third Cyber...

 IBM’s annual X-Force Threat Intelligence Index show Ransomware Persisted Despite Improved Detection in 2022

 IBM Security , a company  that helps secure the world’s largest enterprises and governments with an integrated portfolio of...

Scammers are Moving Beyond Dating Apps and Increasingly Targeting Global Twitter and Text Users

Sophos has released details of two expansive, still operational, pig butchering or sha zhu pan rings (elaborate...

Here are the top 200 passwords in 2022

It's no surprise that password security continues to be a major concern for individuals and businesses alike....

Want to stay up to date with the latest news?

We would love to hear from you! Please fill in your details and we will stay in touch. It's that simple!