How Did Chinese Hackers Hide in Networks for 400 Days?

Data Security

How Did Chinese Hackers Hide in Networks for 400 Days?

As cyber threats continue to evolve, few are as insidious as the recent Chinese cyberespionage campaign involving the BrickStorm malware. To unpack this complex operation, we’re speaking with Vernon Yai, a renowned data protection expert specializing in privacy protection and data governance. With years of experience in risk management and

Malicious GitHub Repositories – Review

Data Security

Malicious GitHub Repositories – Review

Imagine opening your browser to download a trusted application, only to find that the top search result leads you straight into a cybercriminal’s trap, a scenario that is becoming alarmingly common for macOS users who are increasingly targeted by a sophisticated cybercrime campaign using fraudulent GitHub repositories to distribute

Can Zero Trust Stand Up to AI-Driven Cyber Threats?

Data Security

Can Zero Trust Stand Up to AI-Driven Cyber Threats?

In an era where cyber threats evolve at an unprecedented pace, the Zero Trust security model has emerged as a critical framework for organizations striving to protect their digital assets in a perimeter-less world. Anchored on the principle of "never trust, always verify," Zero Trust enforces stringent access controls, rigorous identity

How Did Hackers Exploit Ivanti EPMM Vulnerabilities?

Data Security

How Did Hackers Exploit Ivanti EPMM Vulnerabilities?

In a chilling reminder of the ever-evolving landscape of cyber threats, a recent wave of attacks targeting Ivanti Endpoint Manager Mobile (EPMM) has exposed critical vulnerabilities that hackers have skillfully exploited to gain unauthorized access to sensitive systems. Disclosed earlier this year, two significant flaws, identified as

Can Ray Security Revolutionize Proactive Data Protection?

Data Security

Can Ray Security Revolutionize Proactive Data Protection?

Short introductionMeet Vernon Yai, a renowned data protection expert with deep expertise in privacy protection and data governance. With a career dedicated to pioneering risk management strategies and cutting-edge detection and prevention techniques, Vernon has become a trusted voice in safeguarding sensitive information. In this interview, we

How Do Cyber Threat Actors Use AI and Automation in Attacks?

Data Security

How Do Cyber Threat Actors Use AI and Automation in Attacks?

In an era where digital landscapes are constantly evolving, the sophistication of cyber threats has reached unprecedented levels, with adversaries leveraging cutting-edge technologies to execute attacks with alarming precision. A recent case study involving the accidental deployment of a commercial endpoint detection and response (EDR) agent by a

1 2 3 4 5 6 7 25
1 3 4 5 25

Subscribe to Newsletter

Stay informed about the latest news, developments, and solutions in data security and management.

Invalid Email Address
Invalid Email Address

We'll Be Sending You Our Best Soon

You’re all set to receive our content directly in your inbox.

Something went wrong, please try again later

Subscribe to Newsletter

Stay informed about the latest news, developments, and solutions in data security and management.

Invalid Email Address
Invalid Email Address

We'll Be Sending You Our Best Soon

You’re all set to receive our content directly in your inbox.

Something went wrong, please try again later