How Cobwebs Technologies’ Webint Platform Helps Enterprises To Face The Rising Tide Of Security Risks Emerging From The Dark Web
The ai-based dark web monitoring capability provides a visual representation of cyber events, revealing a larger, graphically displayed picture as inter-connected dots of information based on collected data By Udi…
Maximizing the Impact of AI/ML Threat Detection Tools
By Cary Wright, VP Product Management, Endace Companies are increasingly looking to Artificial Intelligence (AI) and Machine Learning (ML) threat detection tools to improve the security posture of the enterprise….
Boosting Morale During Tough Times Will Also Boost Your Security Resilience
By Nir Polak, CEO, Exabeam While 2020 impacted nearly every business, the pandemic was not the only obstacle leaders faced last year. As we begin 2021, it’s important to remember…
Regula Delivers Remote Identity Verification for Everyone
A modern world requires modern solutions. Fraudsters constantly improve their skills; do not let your services lag behind! By Arif Mamedov, Ph.D., President of Regula Forensics, Inc. Previously an opportunity,…
XLoader, a $49 spyware that could target both Windows and macOS devices
Check Point Research (CPR) experts have spotted a cheap malware, dubbed XLoader variant, which was upgraded to target both Windows and macOS PCs. XLoader is a very cheap malware strain that…
A 16-year-old bug (CVE-2021-3438) in printer driver affects millions of printers worldwide
Experts warn of a 16-year-old vulnerability (CVE-2021-3438) in an HP, Xerox, and Samsung printers driver that an attacker could exploit to gain admin rights on systems. Researchers from SentinelOne discovered…
US DoJ indicts four members of China-linked APT40 cyberespionage group
US DoJ indicted four members of the China-linked cyberespionage group known as APT40 for hacking various entities between 2011 and 2018. The U.S. Justice Department (DoJ) indicted four members of…
Exploring the Synergies Between HIPAA Compliance and Cybersecurity
By Dr. Rachael Bailey, Healthcare IT Content Consultant at Atlantic.Net As the world finds itself in the clutch of a global pandemic, it is evident that cybercriminals are using the…
Current Cybersecurity Weaknesses Will Result in Continued Data Breaches
By Randy Reiter CEO of Don’t Be Breached Problems in cybersecurity resulted in the successful hacking campaign that foreign state hacking groups used leveraging product updates from the IT software…
The Internet of Things Ongoing Directions
By Milica D. Djekic It takes time to get through the journey. Several decades back the global technological landscape has been less developed and different than it is today. In…
The Importance Of Protecting Your App’s Source Code
By Rui Ribeiro, CEO and Co-founder, Jscrambler If your business operations involve any type of web or mobile app, it’s likely that the source code of these apps represents a…
It’s Time to Issue Company Passwords Again
By Rob Cheng, Founder and CEO, PC Matic The recent PC Matic Password Hygiene & Habits Report found that only 16% of employers issue passwords to employees. This is an…