A new iteration of a sophisticated Android spyware called Mandrake has been discovered in five applications that were…
The Power and Peril of RMM Tools
As more people work remotely, IT departments must manage devices distributed over different cities and countries…
Cybercriminals Target Polish Businesses with Agent Tesla and Formbook Malware
Cybersecurity researchers have detailed widespread phishing campaigns targeting small and medium-sized businesses (SMBs) in Poland during…
New Golang-Based Zergeca Botnet Capable of Powerful DDoS Attacks
Cybersecurity researchers have uncovered a new botnet called Zergeca that’s capable of conducting distributed denial-of-service (DDoS)…
86% of UK people managers believe AI tools can improve their role effectiveness
Visier, the globally recognised leader in people analytics and workforce solutions for people-powered business, today unveiled…
5 Key Questions CISOs Must Ask Themselves About Their Cybersecurity Strategy
Events like the recent massive CDK ransomware attack – which shuttered car dealerships across the U.S. in late…
Experts Warn of Mekotio Banking Trojan Targeting Latin American Countries
Financial institutions in Latin America are being threatened by a banking trojan called Mekotio (aka Melcoz).…
OVHcloud Hit with Record 840 Million PPS DDoS Attack Using MikroTik Routers
French cloud computing firm OVHcloud said it mitigated a record-breaking distributed denial-of-service (DDoS) attack in April…
Orca Security Hires Zscaler, Dell Veteran As New Channel Chief
Cloud security unicorn Orca Security announced Tuesday it has named Dell Technologies veteran John Tavares as…
Command Zero Emerges From Stealth Mode to Speed Up Cyber Investigations
Command Zero, a startup leveraging automation and AI to improve the speed and accuracy of cybersecurity…