Advertisement

Over 13,000 malware threats detected every hour in 2020: Report

With new techniques targeting a completely new setup of the global enterprise, 13,733 malware threats were detected every hour in 2020, with Trojan leading...

Kaspersky successfully passes independent SOC 2 audit

Kaspersky has successfully completed the Service Organization Control for Service Organizations (SOC 2) Type 1 audit. The final report, issued by one of the...

US charges 6 Russian intelligence men for global hacking campaign

The US Justice Department has charged six Russian intelligence officers with being part of an extensive worldwide hacking campaign, including the NotPetya ransomware attacks...

Security seen as cost overhead by digital payments stakeholders: Report

One of the key challenges to reducing frauds in India's digital payments ecosystem is that security is seen as a cost overhead and not...

Establishing Unified Endpoint Management in a hybrid work model

By Anand Iyer, Assistant Vice President & Global Delivery Head - Microsoft Business Applications & Modern Workplace, Infosys Unified Endpoint Management (UEM) refers to solutions...

Prolific Ransomware Groups Intentionally Switch On Remote Encryption for Attacks, Sophos Finds

Sophos, a global leader in innovating and delivering cybersecurity as a service, today released a report, titled “CryptoGuard: An Asymmetric Approach to the Ransomware...

How to stay safe online on Black Friday

By Zakir Hussain When the Black Friday craze engulfs the planet, people often throw caution aside for a good deal, opening a door for...

Ex-Uber chief security officer charged with covering up 2016 hack

A former Uber chief security officer has been charged in the US with allegedly covering up the massive 2016 hack that hit the ride-hailing...

Cisco patches critical bug in its Security Manager

Networking giant Cisco has disclosed a critical security vulnerability in Cisco Security Manager that could allow an unauthenticated, remote attacker to gain access to...

Researchers use ‘fingerprints’ tech to spot Russian hackers

Hackers too leave their fingerprints as they attack enterprises and individuals and cyber security researchers have now developed a new technique to “fingerprint” them,...
- Advertisement -

Follow Us

6,235FansLike
244FollowersFollow
488FollowersFollow
101SubscribersSubscribe

Latest article

Lexar appoints Adarsh Technologies as its channel partner for South India

Lexar, has announced the appointment of Adarsh Technologies based in Bengaluru, as its strategic channel partner for the state of Karnataka, South India. As...

Alteryx unveils industry’s first AI assistant designed to empower users to seamlessly build analytical...

Alteryx AiDIN Copilot designed to streamline analytics workflows with natural language AI to make it easier to onboard new users and drive decisions up...

Kaspersky’s award-winning Security Awareness now offered on-premises

A large number of companies around the world have introduced strict security policies that do not allow cloud cybersecurity training solutions due to their...
- Advertisement -