How is Zero Trust Architecture Relevant to Network Visibility
For organizations, it’s crucial to have a granular level of visibility in terms of network security. Read on to know ZTA helps organizations to achieve a much more granular level…
For organizations, it’s crucial to have a granular level of visibility in terms of network security. Read on to know ZTA helps organizations to achieve a much more granular level…
The TrickBot trojan’s operators are partnering with the Shathak threat group to distribute their wares, which would eventually lead to the deployment of Conti ransomware on compromised devices. In a…
Recently, researchers discovered that the Qbot spam campaign continue to rise and is a cause of concern. Read on to know more about it… For nearly a decade, QakBot, also…
Recently, a report revealed how researchers uncovered hacker-for-hire group involved in several data theft operations. Read on to know more… Since at least 2015, a new cyber mercenary hacker-for-hire group…
Recently, Sunwater, Queensland’s largest regional water supplier, disclosed that it was targeted by hackers. Read on to know more about it… Sunwater, Queensland’s largest regional water supplier, revealed that it…
The US announced a $10 million bounty on Thursday for information leading to the arrest of the leaders of the high-profile ransomware group DarkSide, the latest attempt by authorities to…
The resulting infrastructure complexity as a result of hybrid cloud being the dominant IT architecture has opened up cracks that cybercriminals are exploiting. According to a global study on cloud…
As part of a new bug bounty program to strengthen the security of the Linux kernel, Google announced on Monday that it will pay security researchers to uncover security vulnerabilities,…
After Microsoft researchers alerted Apple about the vulnerability that could be used by hackers, Apple fixed the security bug in its MacOS software. Microsoft uncovered a security vulnerability in MacOS…
In the first half of 2021, global cybersecurity firm Trend Micro prevented around 40.9 billion email threats, malicious files, and URLs for its clients, and in India, it blocked a…
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Read More