Internet Security

How Did a Configuration Error Expose Sensitive Info at FlightAware?
Data Protection & Privacy How Did a Configuration Error Expose Sensitive Info at FlightAware?

Discovering a data security breach at a leading company is always alarming, especially when it concerns sensitive personal information. Recently, FlightAware, a renowned provider of real-time flight tracking information, found itself in such a predicament. On July 25, 2024, a configuration error

How Are Cybercriminals Using Legitimate Cloud Services for Phishing?
Infrastructure & Network Security How Are Cybercriminals Using Legitimate Cloud Services for Phishing?

The landscape of cyber threats is constantly evolving, and cybercriminals are always on the lookout for new methods to breach security defenses. In recent times, there has been a notable shift in their tactics. Instead of depending on traditional malware-laden attachments, attackers have started

Boost Your Online Privacy and Security with Free VPNs
Infrastructure & Network Security Boost Your Online Privacy and Security with Free VPNs

In an era where digital privacy and security are of paramount importance, utilizing a Virtual Private Network (VPN) provides an essential layer of protection for online activities such as communication, banking, gaming, and browsing. VPNs work by encrypting internet connections, thereby

How Will DigiCert's Acquisition of Vercara Transform Cybersecurity?
Infrastructure & Network Security How Will DigiCert's Acquisition of Vercara Transform Cybersecurity?

In an unprecedented move set to reshape the cybersecurity landscape, DigiCert has announced its agreement to acquire Vercara, a front-runner in cloud-based security solutions. This acquisition is more than just a business maneuver; it is a strategic step towards integrating and enhancing digital

Zimperium and Okta Collaborate to Enhance Mobile Security with Zero-Trust
Infrastructure & Network Security Zimperium and Okta Collaborate to Enhance Mobile Security with Zero-Trust

The landscape of mobile security is rapidly evolving, and with it comes the necessity for more advanced protective measures. Recognizing this, Zimperium and Okta have joined forces to enhance identity threat protection for mobile devices through a comprehensive zero-trust security model. By

How Can Businesses Combat Sophisticated Infostealer Phishing Attacks?
Infrastructure & Network Security How Can Businesses Combat Sophisticated Infostealer Phishing Attacks?

With the rise in cyber threats, Barracuda Networks has identified a sophisticated wave of phishing attacks leveraging advanced "infostealer" malware that poses a significant risk to businesses. Unlike traditional phishing scams that primarily aim to steal login credentials, this evolved

Loading

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later