According to a Cloud Security Alliance survey on cloud security issues, insufficient identity, credential, access and key management for privileged…
Browsing: Malware and Vulnerabilities
In The Human Factor Report 2022, security vendor Proofpoint found that SMS phishing (smishing) attacks more than doubled year-on-year in 2021.…
With each passing year, hackers and cyber criminals of all kinds are becoming more sophisticated, malicious, and greedy conducting brazen…
Securi researchers are reporting that The Parrot traffic direction system (TDS) that came to light earlier this year on more…
As reported by BBC News, digital fingerprints of a million images of child sexual abuse have been created, the Internet…
EnemyBot, a botnet based on code from multiple malware pieces, is expanding its reach by quickly adding exploits for recently…
Researchers at IBM’s X-Force team are reporting a 94% reduction in the duration of an enterprise ransomware attack from 2019…
In Part 1 published by Information Security Buzz 25th May 2022, the article considered aspects of historic threats posed by…
Whilst the conceptual and academic discussions around dangerous forms of code have been on the agenda of decades past, it…
The benefits of using technology to manage third-party risk are not lost on compliance professionals. When you consider the growing…