Attack

How Critical Is Fortinet's Zero-Day Vulnerability Patch?
Endpoint & Device Security How Critical Is Fortinet's Zero-Day Vulnerability Patch?

In the ever-evolving landscape of cybersecurity, staying ahead of malicious actors is an ongoing struggle. The revelation of Fortinet's zero-day vulnerability highlights the critical importance of rapid security responses within the industry. Known as CVE-2025-32756, this particular security flaw

How Does Coinbase Combat Cyber Threats Without Paying Ransom?
Identity & Access Management How Does Coinbase Combat Cyber Threats Without Paying Ransom?

In today's digital age, the rise of cryptocurrency has simultaneously paved the way for a new wave of complex cyber threats. These threats often target both financial institutions and their customers, aiming to exploit vulnerabilities for financial gain. Recently, Coinbase, a leading cryptocurrency

Is Your TPRM Strategy Ready for Modern Risk Challenges?
Malware & Threats Is Your TPRM Strategy Ready for Modern Risk Challenges?

Rupert Marais is recognized for his extensive expertise in cybersecurity strategies and network management. As our in-house Security specialist, he offers crucial insights into the evolving landscape of third-party risk management. The conversation delves into the key findings from a recent EY

Can Financial Firms Handle Escalating Cyber Threats?
Data Protection & Privacy Can Financial Firms Handle Escalating Cyber Threats?

In recent years, cyber threats have become an ever-growing concern for the financial sector, with incidents such as the one experienced by Insight Partners serving as a stark reminder. This private equity and venture capital firm, with investments in over 800 companies and regulatory assets

Is Deutsche Bank Ignoring Severe Security Breaches?
Infrastructure & Network Security Is Deutsche Bank Ignoring Severe Security Breaches?

Deutsche Bank's recent security breach at its New York data center has sparked significant concerns about the institution’s internal safeguards and accountability measures. This issue came to light through a lawsuit filed by James Papa, a former manager at Computacenter. The lawsuit alleges that

Can Cyber Defenders Outpace Evolving EDR Bypass Attacks?
Data Protection & Privacy Can Cyber Defenders Outpace Evolving EDR Bypass Attacks?

A novel technique called "Bring Your Own Installer" (BYOI) has emerged to bypass Endpoint Detection and Response (EDR) protections, specifically targeting SentinelOne's tamper protection. This method enables cybercriminals to disable EDR agents, paving the way for deploying ransomware like the

Loading

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later