The Latest in IT Security

Posts Tagged ‘Cybercriminals’

Despite authentication being a cornerstone of cybersecurity, risk mitigation strategies remain outdated, according to new research from Enzoic. With the attack surface expanding and the increasing sophistication of cyber threats, organizations are struggling to deliver secure and user-friendly authentication. The research uncovered that despite the emergence of modern strategies, most companies still rely on traditional […]

Read more ...

The AP Stylebook, a writing and editing guide that is widely used by corporations and newsrooms, is hosted on apstylebook.com. However, an older version was until recently also available, on stylebooks.com. This older version, which a third party had maintained on behalf of AP, was no longer in use, but it was still accessible. Threat […]

Read more ...

ESET researchers have identified two active campaigns targeting Android users, where the threat actors behind the tools for Telegram and Signal are attributed to the China-aligned APT group GREF. Most likely active since July 2020 and since July 2022, respectively for each malicious app, the campaigns have distributed the Android BadBazaar espionage code through the […]

Read more ...


Categories

SATURDAY, SEPTEMBER 23, 2023
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments