Threat actors continue to use socially-engineered attacks across email, cloud applications, and social media to exploit human instincts and lure…
Browsing: Identity and Access Management (IAM)
Millions of Phone numbers associated with names and other personal information has been exposed on the Internet in recent days…
A large-scale and prolonged DDoS attack which caused outages in Europe and internationally for Wikipedia on Friday 6 evening into…
More than any other digital communications infrastructure, cybercriminals are increasingly targeting the domain name system. The DNS, often referred to…
It has been reported that PDF solutions provider Foxit has informed customers that it had recently detected unauthorised access to data associated…
TechCrunch is reporting Huge database of Facebook users’ phone numbers found online. Here’s the news brief (we’ve added the bold typeface for emphasis):…
Data protection and privacy have become buzzwords in the European digital ecosystem in the era of GDPR, introduced in May…
Security professionals are quick to laud Two-Factor Authentication (or 2FA) and think their organization is protected from common schemes like…
New survey reveals which applications security professionals believe are worst at spreading malware A new study from Gigamon has revealed that…
When the news broke that a Capital One data breach had affected approximately 100 million customers in the U.S. and…