News

There has been a huge rise in cyberattacks in which attackers are exploiting the vulnerabilities in SAP and Microsoft SQL Server across Asia. These are targeted attacks in which cybercriminals target ...
Email attachments might seem harmless, but they are one of the most common ways attackers infiltrate an organization. A file which appears to be an invoice or internal memo can actually carry ...
QR code scams are one of the growing threats which are targeting employees through deceptive QR codes embedded in emails, printed collateral and digital platforms. Traditional security awareness ...
In the current cyber threats landscape, even the most mature organizations are struggling to maintain the performance of Security Operation Centers (SOCs). As such, understanding and implementing the ...
Are you sure that your customer service provider is secure? Adidas just learned the hard way that third-party vendors can be your weakest cybersecurity link. A recent data breach exposed the contact ...
If you’ve been following the news, you will have heard about the major cyber disruption experienced by Marks & Spencer (M&S). Over the Easter weekend, this iconic UK retailer’s online services, ...
The cybersecurity landscape has widely changed with the advancement of generative AI advancements. In modern times attackers are using LLM models to impersonate trusted entities and automate phishing ...
The quick evolution of cybersecurity demands that we constantly develop innovative solutions to keep ahead of new security threats. Cybersecurity benefits from the implementation of generative AI ...
The continuous growth of cyberattacks is resulting in data breaches and financial losses. Cybersecurity awareness is needed to reduce these modern cyber threats, and also enhance the user’s threat ...
In today’s digital age, staying alert is more important than ever. The FBI warns Gmail users of sophisticated AI-driven phishing attacks, something you should not take lightly. These are not just the ...
For better cybersecurity posture and data protection, IT compliance is a necessary aspect for organizations and businesses. It is essential to follow industry-standardized rules and regulations to ...
Ransomware is one of the most serious threats to internet users today, and CryptoLocker ransomware was the attack that started it all. This ransomware came into prominence in 2013, locking up ...