The Latest in IT Security

1

Cybersecurity researchers from Volexity have discovered a previously unknown, custom malware designed for macOS that they say is capable of taking control of the target’s Google Drive account. The malware is most likely developed by Storm Cloud, a Chinese cyber-espionage threat actor that, judging by its complexity, has formidable skills and resources. Read More

Read more ...

1

Panaseer shares data on actions enterprises are willing to take to solve the escalating cyber insurance crisis. In recent years the cyber landscape has been dominated by a sharp increase in ransomware attacks. According to SonicWall, ransomware attacks increased 105% in 2021 and Sophos’ report, the “State of Ransomware 2021,” revealed the average ransom paid […]

Read more ...

1

Veritas Technologies announced the results of a new study revealing that the majority of organizations are underprepared to face threats against their Kubernetes environments. Kubernetes is being rapidly deployed into mission-critical environments in organizations around the world, the research showed, with 86% of organizations expecting to deploy the technology in the next two to three […]

Read more ...


Categories

THURSDAY, APRIL 03, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments