Month: February 2023
-
Cyolo unveils partner program to accelerate adoption of zero-trust access
Cyolo introduced partner program designed to help organizations enhance their cybersecurity capabilities for protecting sensitive systems …
-
Two of The Worst Healthcare Data Breaches in US History Happened Last Year
Network Assured shared the results of a recent study on cyberattacks against U.S. healthcare …
-
Hoxhunt Launches Human Risk Management Platform
, Feb. 28, 2023 /PRNewswire/ — Hoxhunt, the leading cybersecurity behavior change software company, today announced the availability of …
-
How can Vault Vision help secure your company with passwordless login?
Boosting security in any way possible has become crucial for businesses of all sizes. In today’s digital era, businesses face a host of …
-
LastPass DevOps Engineer Targeted for Cloud Decryption Keys in Latest Breach Revelation
The adversaries obtained a decryption key to a LastPass database containing multifactor authentication and federation information as well …
-
US cybersecurity chief: Software makers shouldn’t lawyer their way out of security responsibilities
What’s more dangerous than Chinese spy balloons? Unsafe software and other technology products, according to America’s Cybersecurity and …
-
What is Network Detection and Response (NDR)? Ultimate Guide
Network detection and response, or NDR, is a cybersecurity tool that continuously scans traffic for potential risks by using machine …
-
Dish Network Confirms Ransomware Is to Blame for Ongoing Outage
Hackers stole data from the company’s systems, which possibly includes personal …
-
Exfiltrator-22: The Newest Post-Exploitation Toolkit Nipping at Cobalt Strike’s Heels
The framework-as-a-service signals an intensification of the cat-and-mouse game between defenders detecting lateral movement, and …
-
What Is Managed Detection and Response (MDR)? Ultimate Guide
Remediation is the recovery support an organization can expect from an MDR provider. Arguably, this is the most critical component of an …
-
New cyberattack tactics rise up as ransomware payouts increase
While phishing, business email compromise (BEC), and ransomware still rank among the most popular cyberattack techniques, a mix of …
-
Dish: Someone snatched our data, if you’re wondering why our IT systems went down
Dish has confirmed what everyone was suspecting, given the ongoing downtime experienced by some of its systems, that the US telco was hit …
●●●