corporate
-
Mitigate the LastPass Attack Surface in Your Environment with this Free Tool
Jan 05, 2023The Hacker NewsPassword Management / IT Breach The latest breach announced by LastPass is a major cause for…
Read More » -
A Guide to Efficient Patch Management with Action1
Dec 20, 2022The Hacker NewsPatch Management / Endpoint Security It’s no secret that keeping software up to date is one…
Read More » -
Top 4 SaaS Security Threats for 2023
Dec 12, 2022The Hacker NewsSaaS Security / SSPM Solution With 2022 coming to a close, there is no better time…
Read More » -
Keep Your Grinch at Bay: Here’s How to Stay Safe Online this Holiday Season
Dec 12, 2022The Hacker NewsDNS Security / Online Security As the holiday season approaches, online shopping and gift-giving are at…
Read More » -
Schoolyard Bully Trojan Apps Stole Facebook Credentials from Over 300,000 Android Users
More than 300,000 users across 71 countries have been victimized by a new Android threat campaign called the Schoolyard Bully…
Read More » -
The 5 Cornerstones for an Effective Cyber Security Awareness Training
It’s not news that phishing attacks are getting more complex and happening more often. This year alone, APWG reported a…
Read More » -
All You Need to Know About Emotet in 2022
For 6 months, the infamous Emotet botnet has shown almost no activity, and now it’s distributing malicious spam. Let’s dive…
Read More » -
Deep Packet Inspection vs. Metadata Analysis of Network Detection & Response (NDR) Solutions
Today, most Network Detection and Response (NDR) solutions rely on traffic mirroring and Deep Packet Inspection (DPI). Traffic mirroring is…
Read More »