Joshua Kaina

Joshua Kaina

Secure Transfer Expert
Joshua Kaina provides data security professionals with rich insights into secure transfers and related emerging technologies. He follows the industry’s latest advancements to help data managers understand which solutions are best suited to their industry and needs.  
ShinyHunters and Scattered Spider Join Forces in Extortion

Data Security

ShinyHunters and Scattered Spider Join Forces in Extortion

Unveiling the Cybercrime Alliance Imagine a digital heist where two masterminds of cybercrime pool their skills to orchestrate attacks that are nearly impossible to predict or prevent, creating a terrifying new reality in the world of cybersecurity. This is the alarming situation unfolding as ShinyHunters and Scattered Spider, two infamous threat

Are Hidden Risks Undermining Passwordless Recovery?

Data Security

Are Hidden Risks Undermining Passwordless Recovery?

What happens when the cutting-edge security systems designed to protect digital identities become the very gateway for attackers? In a world rapidly embracing passwordless authentication, a startling vulnerability lurks in the shadows of account recovery processes, threatening billions of users who rely on biometrics, passkeys, and tokens for

SoupDealer Malware Evades Defenses with Advanced Tactics

Data Security

SoupDealer Malware Evades Defenses with Advanced Tactics

In the ever-evolving landscape of cybersecurity threats, a new and formidable adversary has emerged, striking at the heart of digital defenses with unparalleled sophistication, known as SoupDealer. This malware has demonstrated an uncanny ability to slip past nearly all public sandboxes, antivirus solutions, and even advanced endpoint detection

ShinyHunters Breaches Google via Salesforce Vulnerabilities

Data Security

ShinyHunters Breaches Google via Salesforce Vulnerabilities

I'm thrilled to sit down with Vernon Yai, a renowned data protection expert with deep expertise in privacy protection and data governance. With a career dedicated to risk management and pioneering detection and prevention techniques, Vernon has become a trusted voice in safeguarding sensitive information. Today, we’ll dive into the evolving world

How Does Agentic AI Slash Cyber Response Times by 70%?

Data Security

How Does Agentic AI Slash Cyber Response Times by 70%?

In an era where cyber threats evolve at a breakneck pace, the ability to respond to incidents swiftly and effectively has become a cornerstone of digital defense. Imagine a scenario where a sophisticated ransomware attack targets an organization’s critical systems, and within mere minutes, an autonomous system detects the anomaly, isolates the

HeartCrypt-Packed AVKiller Targets EDR in Ransomware Attacks

Data Security

HeartCrypt-Packed AVKiller Targets EDR in Ransomware Attacks

In the shadowy realm of cybersecurity, a chilling new weapon has emerged, striking at the very heart of organizational defenses with surgical precision, and it is known as AVKiller, cloaked in HeartCrypt obfuscation. This malicious tool is being actively wielded by cybercriminals to dismantle endpoint detection and response (EDR) systems—crucial

1 2 3 4 5 6 35
1 2 3 4 35

Subscribe to Newsletter

Stay informed about the latest news, developments, and solutions in data security and management.

Invalid Email Address
Invalid Email Address

We'll Be Sending You Our Best Soon

You’re all set to receive our content directly in your inbox.

Something went wrong, please try again later

Subscribe to Newsletter

Stay informed about the latest news, developments, and solutions in data security and management.

Invalid Email Address
Invalid Email Address

We'll Be Sending You Our Best Soon

You’re all set to receive our content directly in your inbox.

Something went wrong, please try again later