How attackers use Microsoft agents to steal OAuth tokens
AI agents are proving to be extremely resourceful. Among their discoveries can be OAuth tokens, which these d...
AI agents are proving to be extremely resourceful. Among their discoveries can be OAuth tokens, which these d...
Cybersecurity has been a challenge from the beginning of IT and it will be until the end. It all started with endpoint and network security, but today we are also dealing with cloud security and training our employees to incorporate good security practices. All these new technologies that help us innovate also help cybercriminals and state-sponsored hackers get new tools that they can use to access our systems and, in the worst cases, gain access to our most valuable data and trade secrets. Moreover, with new legislation such as GDPR, you have to make sure everything is secure or you will not only lose your reputation, but you could also be fined by the government. In short, protecting IT environments is more important than ever.
KnowBe4, a vendor of security awareness, anti-phishing and compliance training, developed a tool that makes i...
Security threats have been found impersonating the human resource employees from Collins Aerospace and Genera...
Cybersecurity company Unbound Tech launched a passwordless login system called Crypto-of-Things. The system u...
Amazon Web Services successfully mitigated a 2.3 Tbps DDoS attack in February this year. It is the largest DD...
The amount of cybercrime activity has increased in recent years, despite attempts by various authorities to r...
CrowdStrike announced that the Falcon platform is enhanced with Linux protection capabilities. The platform o...
IBM recently acquired the software components of the cloud security posture management (CSPM) specialist Span...
Acronis extends access to Acronis Cyber Protect through a beta version now available to all IT teams. With...
Multistage ransomware attacks on vital infrastructure providers are becoming more dangerous and frequent, acc...
Working from home has a significant impact on the risks to which company systems and sensitive data are expos...