News
An Adidas data breach through a third-party vendor exposed customer details like emails and phone numbers, raising concerns ...
Think your passwords are strong enough? AS-REP Roasting is back in the spotlight — and it's targeting weak spots in Active ...
Russian state-sponsored hackers have been targeting European governments using zero day vulnerabilities, China has been hiding its spying activities using open-source VPNs, and North Korea has been ...
Are You Doing Enough to Secure Your Cloud NHIs? Is your organization’s cloud security robust enough to protect your non-human identities (NHIs)? This is a question that has been increasingly haunting ...
Rate limiting plays a major role in application security, especially when it is about defending web applications from malicious bot attacks, credential stuffing, brute force attacks and excessive API ...
As you can see from our pictures, the theme of Infosec 2025 is "Building a Safer Cyber World" - something you can bet we'll ...
Identities are today’s top attack vector. Here's how to build a layered security approach that reduces privilege risk across ...
Scattered Spider isn't one group — it's an identity-first threat model evolving fast. From vishing to AiTM phishing, they're ...
Government agencies are continuously targeted by advanced persistent threats (APTs) from nation-state adversaries, requiring ...
The ease with which scammers can access Nectar points was revealed in January, when This Is Money revealed over 12 million ...
Cybersecurity leaders who fail to address the AI threat adequately may find themselves at a disadvantage as attacks become ...
Varonis connects the dots between identities and data, helping organizations automatically reduce access to their most sensitive data, fix identity posture issues, and stop identity-based threats — ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results