Joshua Kaina

Joshua Kaina

Secure Transfer Expert
Joshua Kaina provides data security professionals with rich insights into secure transfers and related emerging technologies. He follows the industry’s latest advancements to help data managers understand which solutions are best suited to their industry and needs.  
How Does Crypto24 Ransomware Evade Modern EDR Solutions?

Data Security

How Does Crypto24 Ransomware Evade Modern EDR Solutions?

What happens when the very systems designed to safeguard critical data become the target of a relentless cyberthreat? In a chilling development, Crypto24 ransomware has emerged as a formidable adversary, bypassing Endpoint Detection and Response (EDR) solutions that countless organizations depend on for protection. This sophisticated strain of

Critical Zero-Day Flaw Exposed in Elastic EDR Software

Data Security

Critical Zero-Day Flaw Exposed in Elastic EDR Software

In a startling revelation that has sent shockwaves through the cybersecurity community, a critical zero-day vulnerability has been uncovered in Elastic’s Endpoint Detection and Response (EDR) software, transforming a tool designed to protect enterprise systems into a potential gateway for devastating attacks. Discovered by a reputable

GoTo Integrates LogMeIn Resolve with SentinelOne for EDR

Data Security

GoTo Integrates LogMeIn Resolve with SentinelOne for EDR

In an era where cyber threats are becoming increasingly sophisticated and the financial impact of data breaches has soared to an average global cost of $4.9 million, the need for robust endpoint security has never been more urgent. Managed Service Providers (MSPs) and IT departments face mounting pressure to safeguard their infrastructures against

Are AI Chips From NVIDIA and AMD a Security Risk for China?

Data Security

Are AI Chips From NVIDIA and AMD a Security Risk for China?

In an era where artificial intelligence shapes the future of global power dynamics, the security of AI chips has emerged as a critical flashpoint in the intensifying rivalry between the United States and China, with far-reaching implications. These high-performance processors, produced by industry giants NVIDIA and AMD, are not merely

ShinyHunters and Scattered Spider Join Forces in Extortion

Data Security

ShinyHunters and Scattered Spider Join Forces in Extortion

Unveiling the Cybercrime Alliance Imagine a digital heist where two masterminds of cybercrime pool their skills to orchestrate attacks that are nearly impossible to predict or prevent, creating a terrifying new reality in the world of cybersecurity. This is the alarming situation unfolding as ShinyHunters and Scattered Spider, two infamous threat

Are Hidden Risks Undermining Passwordless Recovery?

Data Security

Are Hidden Risks Undermining Passwordless Recovery?

What happens when the cutting-edge security systems designed to protect digital identities become the very gateway for attackers? In a world rapidly embracing passwordless authentication, a startling vulnerability lurks in the shadows of account recovery processes, threatening billions of users who rely on biometrics, passkeys, and tokens for

1 4 5 6 7 8 9 10 39
1 6 7 8 39

Subscribe to Newsletter

Stay informed about the latest news, developments, and solutions in data security and management.

Invalid Email Address
Invalid Email Address

We'll Be Sending You Our Best Soon

You’re all set to receive our content directly in your inbox.

Something went wrong, please try again later

Subscribe to Newsletter

Stay informed about the latest news, developments, and solutions in data security and management.

Invalid Email Address
Invalid Email Address

We'll Be Sending You Our Best Soon

You’re all set to receive our content directly in your inbox.

Something went wrong, please try again later