corporate
-
How to Protect Patients and Their Privacy in Your SaaS Apps
The healthcare industry is under a constant barrage of cyberattacks. It has traditionally been one of the most frequently targeted…
Read More » -
Banking Sector Targeted in Open-Source Software Supply Chain Attacks
Cybersecurity researchers said they have discovered what they say is the first open-source software supply chain attacks specifically targeting the…
Read More » -
Microsoft Expands Cloud Logging to Counter Rising Nation-State Cyber Threats
Microsoft on Wednesday announced that it’s expanding cloud logging capabilities to help organizations investigate cybersecurity incidents and gain more visibility…
Read More » -
Chinese APT41 Hackers Target Mobile Devices with New WyrmSpy and DragonEgg Spyware
The prolific China-linked nation-state actor known as APT41 has been linked to two previously undocumented strains of Android spyware called…
Read More » -
U.S. Government Blacklists Cytrox and Intellexa Spyware Vendors for Cyber Espionage
The U.S. government on Tuesday added two foreign commercial spyware vendors, Cytrox and Intellexa, to an economic blocklist for weaponizing…
Read More » -
The Risks and Preventions of AI in Business: Safeguarding Against Potential Pitfalls
Artificial intelligence (AI) holds immense potential for optimizing internal processes within businesses. However, it also comes with legitimate concerns regarding…
Read More » -
How Generative AI Can Dupe SaaS Authentication Protocols — And Effective Ways To Prevent Other Key AI Risks in SaaS
Security and IT teams are routinely forced to adopt software before fully understanding the security risks. And AI tools are…
Read More » -
SaaS in the Real World: How Global Food Chains Can Secure Their Digital Dish
The Quick Serve Restaurant (QSR) industry is built on consistency and shared resources. National chains like McDonald’s and regional ones…
Read More » -
20-Year-Old Russian LockBit Ransomware Affiliate Arrested in Arizona
The U.S. Department of Justice (DoJ) on Thursday unveiled charges against a Russian national for his alleged involvement in deploying…
Read More » -
Where from, Where to — The Evolution of Network Security
For the better part of the 90s and early aughts, the sysadmin handbook said, “Filter your incoming traffic, not everyone…
Read More »