Malware & Threats

Securing Microsoft 365 Copilot: Addressing the ASCII Smuggling Threat
Malware & Threats Securing Microsoft 365 Copilot: Addressing the ASCII Smuggling Threat

The discovery of a significant vulnerability within Microsoft 365 Copilot has sent waves through the cybersecurity community. Known as ASCII smuggling, this novel technique leverages special Unicode characters to disguise malicious data payloads within hyperlinks, exposing sensitive user

September 5, 2024
How Will the New ATPC Transform Cybersecurity for Critical Infrastructures?
Malware & Threats How Will the New ATPC Transform Cybersecurity for Critical Infrastructures?

The launch of the Advanced Threat Protection Center (ATPC) by 1898 & Co. in Houston marks a pivotal moment in the effort to strengthen cybersecurity for critical infrastructure in the United States. As cyber threats become increasingly sophisticated and targeted, the ATPC aims to provide robust

September 5, 2024
Can ERP Systems Survive Ransomware in the Age of AI Threats?
Infrastructure & Network Security Can ERP Systems Survive Ransomware in the Age of AI Threats?

The rise of artificial intelligence (AI) has brought significant advancements across various industries, but it has also increased the complexity and frequency of cyber threats. Enterprise Resource Planning (ERP) systems, which are crucial for the seamless operation of large enterprises, are not

September 5, 2024
Enhancing LCNC Security: Adopting CTEM for Low-Code/No-Code Platforms
Malware & Threats Enhancing LCNC Security: Adopting CTEM for Low-Code/No-Code Platforms

The rapidly evolving landscape of low-code/no-code (LCNC) development and robotic process automation (RPA) has revolutionized how organizations approach software creation, enabling faster development cycles and increased efficiency. However, these advancements have also introduced new cybersecurity

September 3, 2024
Is the Future of 5G Signaling Security in Software-based Solutions?
Infrastructure & Network Security Is the Future of 5G Signaling Security in Software-based Solutions?

As the world rapidly advances toward widespread adoption of 5G networks, the security of these networks becomes increasingly critical. One of the most intriguing developments in this space is the shift from traditional hardware-based signaling firewalls to software-based solutions. This article

August 28, 2024
Contrast Security Launches ADR for Robust Application and API Protection
Malware & Threats Contrast Security Launches ADR for Robust Application and API Protection

Contrast Security has made a groundbreaking leap in the realm of cybersecurity with the recent launch of its Application Detection and Response (ADR) solution. This cutting-edge technology promises to empower security teams by uniquely identifying vulnerabilities, detecting threats, and stopping

August 7, 2024
Loading

Subscribe to our weekly news digest!

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for subscribing.
We'll be sending you our best soon.
Something went wrong, please try again later