June 27, 2022
Via: Natalie DunnGovernments and companies around the world are concerned about the growing risks of cyberattacks against their critical infrastructure. The pandemic and the current crisis in Ukraine have intensified cyberattacks as criminals continue to direct their efforts toward leveraging increasingly sophisticated […]
June 14, 2022
Via: Natalie DunnWith cyberattacks on the rise, it’s more vital than ever for organizations to be able to test the strength of their systems. A penetration test or “pentest” is an efficient process when it comes to identifying and exploiting vulnerabilities within […]
May 20, 2022
Via: Natalie DunnCybercriminals are continuing to exploit the ongoing crisis in Ukraine. After initial report of increased malicious and scam activity, the Russian invasion in Ukraine led to the largest-ever spike in DDoS attacks. Compared to the first quarter of 2021, the […]
May 16, 2022
Via: Natalie DunnResearchers at three universities have unearthed a vulnerability in Apple Silicon used in Macs, iPhones, and iPads. While any vulnerability is a cause for alarm, the researchers state that the risk is “not that bad”. The weakness has been dubbed […]
April 25, 2022
Via: Nakisani JacobsAt the same time that the implications of the global pandemic have created difficulties for many, they have also sparked an opportunity for growth and change. One key area that has continued to evolve even as we return to a […]
April 20, 2022
Via: Nakisani JacobsToday’s businesses, regardless of size, are vulnerable to hacking and data theft, which can result in significant financial loss. A virtual private network (VPN) uses advanced technology to protect your business data and keep you safe from online threats. A […]
April 20, 2022
Via: Natalie DunnCreating the perfect password is not a complicated endeavor, and it is crucial for business and personal safety. Passwords like 123456, “password” and “qwerty” are common, and should be avoided. Even more complicated passwords can be easily cracked if a […]
April 8, 2022
Via: Natalie DunnRansomware-as-a-Service (RaaS) is a relatively new acronym in IT terminology. Derived from the more common SaaS, PaaS or IaaS, RaaS defines a service that is not only available to ordinary users, but also to cybercriminals. Regardless of the business or […]
March 31, 2022
Via: Natalie DunnNow more than ever, companies have digital assets to protect and more users who need to access them from different places. Credential-based threats make it difficult to secure these valuable resources while making them easily accessible to those who legitimately […]
March 23, 2022
Via: Natalie DunnCybercriminals, political and other threat actors are trying to exploit the ongoing crisis in Ukraine. Since the start of the Russian invasion in Ukraine, several major software and games developers have fallen victim to cyberattacks. Furthermore, cybersecurity researchers are detecting […]
July 1, 2022
July 1, 2022