Risk & Compliance

Threat Intelligence Automation

Cyber Threat Intelligence (CTI) is a framework and technology that generates intelligence that can, or will respond to cyber threat attacks that are now...

Why Companies Should Care More About Credential Breach?

Phishing attacks and stolen credentials are becoming more common in the world of data security, and employee errors are helping to pave the way,...

Latest news

Microsoft Edge browser will warn users about “leaked” passwords

The browser will constantly check the information against databases of information about declassified logins and passwords. Continuous monitoring of passwords...

NAME: WRECK vulnerabilities threaten millions of IoT devices

Forescout experts presented a report on nine vulnerabilities in TCP / IP stacks, collectively named NAME: WRECK . These problems affect hundreds...

Pwn2Own ended 2021. Windows 10, Ubuntu, Safari, Chrome, Zoom and more were successfully jailbroken

The largest hacking competition - the spring Pwn2Own 2021 - has ended. This time it all ended in a...

Must read

28 dangerous extensions detected for Google Chrome and Microsoft Edge

Avast experts have discovered malware hidden in at least 28 third-party...

You might also likeRELATED
Recommended to you

Microsoft Teams: new advanced phishing campaign spotted

A new and advanced Microsoft Teams phishing campaign has...

Zerologon, first exploits spotted

Zerologon, probably one of the most dangerous vulnerability spotted...

Hackers add fraudulent online stores on top of WordPress sites

A new cybercriminal group attacks WordPress sites and installs...