Proofpoint Email Routing Flaw Exploited to Send Millions of Spoofed Phishing Emails

“For CISOs, the main takeaway here is to take extra care of their organization’s cloud posture…

How Searchable Encryption Changes the Data Security Game

Searchable Encryption has long been a mystery. An oxymoron. An unattainable dream of cybersecurity professionals everywhere.…

SentinelOne CEO On CrowdStrike Outage: ‘Not Just An Honest Mistake’

The massive Microsoft Windows outage set off by a CrowdStrike update on July 19 was the consequence of…

CrowdStrike: Microsoft’s Windows Kernel Update Process ‘Was Followed’

CrowdStrike said the July 19 update that led to a global IT outage did not bypass…

New Mandrake Spyware Found in Google Play Store Apps After Two Years

A new iteration of a sophisticated Android spyware called Mandrake has been discovered in five applications that were…

The Power and Peril of RMM Tools

As more people work remotely, IT departments must manage devices distributed over different cities and countries…

Cybercriminals Target Polish Businesses with Agent Tesla and Formbook Malware

Cybersecurity researchers have detailed widespread phishing campaigns targeting small and medium-sized businesses (SMBs) in Poland during…

New Golang-Based Zergeca Botnet Capable of Powerful DDoS Attacks

Cybersecurity researchers have uncovered a new botnet called Zergeca that’s capable of conducting distributed denial-of-service (DDoS)…

86% of UK people managers believe AI tools can improve their role effectiveness

Visier, the globally recognised leader in people analytics and workforce solutions for people-powered business, today unveiled…

5 Key Questions CISOs Must Ask Themselves About Their Cybersecurity Strategy

Events like the recent massive CDK ransomware attack – which shuttered car dealerships across the U.S. in late…