Identity & Access Management

Trojanized SonicWall VPN App Steals Users' Sensitive Data
Identity & Access Management Trojanized SonicWall VPN App Steals Users' Sensitive Data

In the ever-persistent battle against cybercrime, a recent incident has once again spotlighted the vulnerabilities faced by software users worldwide. Attackers have successfully tampered with SonicWall's NetExtender VPN application to craft a trojanized version that stealthily siphons off sensitive

How Can Companies Defend Against Scattered Spider's Threat?
Identity & Access Management How Can Companies Defend Against Scattered Spider's Threat?

The cybercriminal group known as Scattered Spider poses an increasingly potent threat as it diversifies its targets across various industries using refined phishing and ransomware tactics. This shifting landscape is underscored by the revelation of over 500 phishing domains assimilated into their

AWS Cloud Security Enhancements – Review
Identity & Access Management AWS Cloud Security Enhancements – Review

The digital world continues to expand at an unprecedented rate, with cloud computing becoming central to organizations of all sizes. As businesses increasingly rely on cloud solutions, the importance of robust security measures cannot be understated. Amazon Web Services (AWS) has responded to this

Can Singapore's New Law Effectively Combat Rising Scam Cases?
Identity & Access Management Can Singapore's New Law Effectively Combat Rising Scam Cases?

Singapore confronts a daunting challenge with its escalating scam issue, where technological sophistication and widespread connectivity have inadvertently opened avenues for fraudsters. Recently reported losses due to scams in the nation have alarmingly topped S$1.1 billion, necessitating urgent

Identity Misconfigurations: A New Cybersecurity Threat
Identity & Access Management Identity Misconfigurations: A New Cybersecurity Threat

In an era where cyber defenses are increasingly fortified with cutting-edge technology, are today's organizations overlooking a glaring vulnerability right beneath their noses? While much focus remains on thwarting malware and hacking attempts, a newfound threat—identity misconfigurations—is

How Are Tourists Falling for These Holiday Cabin Scams?
Identity & Access Management How Are Tourists Falling for These Holiday Cabin Scams?

Amidst the charm of digital convenience, a dark underbelly continues to rise, ensnaring unsuspecting travelers with promises too good to pass up. Tourists, eager for the comfort of serene holiday cabins, often fall prey to elaborate scams orchestrated with precision and deceit. Such is the case of

Loading

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later