Modern Listing Example
Spike In Cybercriminal Activity for Business Email
Microsoft has released its fourth edition of Cyber Signals, highlighting a surge in cybercriminal activity…
Deepfakes: I Have No Mouth, And I Must Do Crime
Recorded Future has released the findings of its latest deepfakes research. Titled “I Have No Mouth, And I…
NetApp’s Ransomware Recovery Guarantee
NetApp has announced several products and programs including a new modern block storage offering and…
Shadow API Usage Surges 900%
Cequence Security has released its second half 2022 report, API Protection Report: Holiday Build-up Shows 550%…
Critical Infrastructure Cybersecurity Spend to Reach US$236B
With the impacts of COVID-19 on cybersecurity spending budgets behind industrial sectors, worldwide investments in…
April 2023’s Most Wanted Malware
Check Point has published its Global Threat Index for April 2023. Last month, researchers uncovered a…
Triple Threat: Breaking Teltonika Routers Three Ways
Written by Noam Moshe, Roni Gavrilov-OTORIO. The Teltonika Remote Management System (RMS) product is a cloud-based or on-premises platform that enables users to monitor and manage their connected devices…
Bitdefender’s App Anomaly Detection
Bitdefender has unveiled App Anomaly Detection. The company says it the industry’s first real-time, behavior-based…