How attackers use Microsoft agents to steal OAuth tokens
AI agents are proving to be extremely resourceful. Among their discoveries can be OAuth tokens, which these d...
AI agents are proving to be extremely resourceful. Among their discoveries can be OAuth tokens, which these d...
Cybersecurity has been a challenge from the beginning of IT and it will be until the end. It all started with endpoint and network security, but today we are also dealing with cloud security and training our employees to incorporate good security practices. All these new technologies that help us innovate also help cybercriminals and state-sponsored hackers get new tools that they can use to access our systems and, in the worst cases, gain access to our most valuable data and trade secrets. Moreover, with new legislation such as GDPR, you have to make sure everything is secure or you will not only lose your reputation, but you could also be fined by the government. In short, protecting IT environments is more important than ever.
The American bank Capital One has been the victim of a large-scale hack. 33-year-old software engineer Paige T...
Kaspersky and the Gagarin Research and Test Cosmonaut Training Center have started a collaboration to train co...
Security researchers Orange Tsai and Meh Chang have found several vulnerabilities in popular business VPN serv...
Research by KnowBe4, expert on phishing attacks, shows that the use of LinkedIn in the subject line of phishin...
The risk of exploiting BlueKeep, a vulnerability in the Windows remote desktop protocol (RDP), has increased s...
Two out of every five companies have suffered (or have suffered) from theft of Microsoft Office 365 user data....
Cybersecurity company SentinelOne, which produces autonomous endpoint security software, announces that it is ...
Equifax, an American credit bureau, is likely to be fined $700 million by several American watchdogs. The reas...
Top people from various American tech companies have been invited to the White House to discuss the ban on tra...