Understanding the concepts can get confusing as the terms are used interchangeably, but each has its…
30+ Remarkable Twitter Statistics to Be Aware of in 2023
Twitter is among the most popular (and powerful) social media networks. How you leverage the platform…
Dove’s Latest Campaign Takes On A Popular TikTok Filter
In late February a new filter called “Bold Glamour” took TikTok by storm. The Bold Glamour…
Google Warns Against Commercial Spyware Exploiting Zero-Days
Google’s Threat Analysis Group (TAG) has revealed tracking over 30 commercial spyware vendors that facilitate the…
Clop Ransomware Group Exploits GoAnywhere MFT Flaw
The ransomware gang known as Clop has been observed exploiting a pre-authentication command injection vulnerability (CVE-2023-0669)…
Attacks Targeting APIs Increased By 400% in Last Six Months
Attacks targeting application programming interfaces (APIs) have increased 400% in the last six months. The findings…
Tech Industry Bids to Tackle Cyber-Mercenary Epidemic
Some of the biggest names in the IT industry have released a new set of principles…
Okta Unveils Redesigned Channel Program To Better Reward Services Partners, Integrators
Okta has overhauled its channel program to recognize and incentivize partners for contributing value in numerous…
3CX Supply Chain Attack: 8 Biggest Things To Know
Potentially ‘Massive’ Attack The supply chain compromise of a widely used VoIP phone system vendor, 3CX,…
Many Customers May Reassess Using 3CX After Supply Chain Breach: Expert
All customers that use 3CX’s phone system ‘will and should engage in a new risk assessment…