
Wiz is “Deployed on AWS” despite Google acquisition
From now on, Wiz will also run natively on AWS. With this "Deployed on AWS" status, integration with the worl...
From now on, Wiz will also run natively on AWS. With this "Deployed on AWS" status, integration with the worl...
Cybersecurity has been a challenge from the beginning of IT and it will be until the end. It all started with endpoint and network security, but today we are also dealing with cloud security and training our employees to incorporate good security practices. All these new technologies that help us innovate also help cybercriminals and state-sponsored hackers get new tools that they can use to access our systems and, in the worst cases, gain access to our most valuable data and trade secrets. Moreover, with new legislation such as GDPR, you have to make sure everything is secure or you will not only lose your reputation, but you could also be fined by the government. In short, protecting IT environments is more important than ever.
A new malicious Android malware known as "Goldoson" has infiltrated the Google Play Store, infecting 60&...
The Center for Cybersecurity Policy and Law, an Infosec think tank, has announced two new initiatives aimed a...
Storage vendor Western Digital has been the latest company to be hit by hackers. Some ten terabytes of data, ...
Ransomware is the fastest growing type of cybercrime. Analysts predict ransomware will attack a business ever...
Fortinet introduces the FortiGate 7081F Next-Generation Firewall (NGFW). The firewall promises data centers g...
This new generation of botnets uses leaked API credentials or known exploits to enslave vulnerable and miscon...
Cybersecurity firm Cybersixgill has released a report on current trends in cybercrime. It shows that generati...
VoIP software vendor 3CX will soon implement a forced security upgrade of its progressive web application (PW...
Israeli cybersecurity company Sygnia has set its sights on RagnarLocker, a group of ransomware criminals. Usi...
Two new threat analyses expose a new player in the field of targeted hacking for intelligence gathering. N...