Identity Security

Memento Spyware Exploits Chrome Zero-Day in Cyber Attacks
Identity & Access Management Memento Spyware Exploits Chrome Zero-Day in Cyber Attacks

In a world where billions rely on Google Chrome for secure browsing, a chilling revelation has emerged: a hidden flaw in the browser has been weaponized by sophisticated spyware to infiltrate systems undetected. Discovered by cybersecurity experts at Kaspersky Lab, this zero-day vulnerability,

How Did SonicWall's Data Breach Affect All Cloud Backup Users?
Identity & Access Management How Did SonicWall's Data Breach Affect All Cloud Backup Users?

The cybersecurity landscape was rocked by a staggering revelation when a leading network security vendor disclosed a data breach that initially seemed minor but soon escalated to affect every single user of its cloud backup service. This incident, involving the compromise of encrypted credentials

Scam Clothing Sites Misuse Home Addresses for Returns
Identity & Access Management Scam Clothing Sites Misuse Home Addresses for Returns

I'm thrilled to sit down with Rupert Marais, our in-house security specialist with deep expertise in endpoint and device security, cybersecurity strategies, and network management. Today, we're diving into a troubling trend in online scams, specifically how fraudulent clothing websites are

Akira Ransomware Targets SonicWall VPNs in Major Campaign
Identity & Access Management Akira Ransomware Targets SonicWall VPNs in Major Campaign

In a disturbing surge of cyber threats sweeping through the digital landscape, a sophisticated ransomware strain known as Akira has zeroed in on SonicWall VPN customers, orchestrating a vast and relentless campaign that has been active since at least mid-July 2023, with evidence of malicious

Iranian Hackers Exploit SSL.com Certificates for Malware
Identity & Access Management Iranian Hackers Exploit SSL.com Certificates for Malware

In a disturbing turn of events that has sent ripples through the cybersecurity community, Iranian state-sponsored hackers, identified as UNC1549, have been uncovered using digital certificates from SSL.com, a Houston-based certificate authority, to sign malicious software with alarming success.

Which ATO Protection Tools Lead in 2025 Cybersecurity?
Identity & Access Management Which ATO Protection Tools Lead in 2025 Cybersecurity?

In the dynamic and ever-evolving digital landscape of 2025, businesses across sectors such as e-commerce, banking, healthcare, and software-as-a-service (SaaS) face an unrelenting threat from account takeover (ATO) attacks, which are often executed through credential stuffing, phishing, and

Loading

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later