Over 13,000 malware threats detected every hour in 2020: Report
With new techniques targeting a completely new setup of the global enterprise, 13,733 malware threats were detected every hour in 2020, with Trojan leading...
Kaspersky successfully passes independent SOC 2 audit
Kaspersky has successfully completed the Service Organization Control for Service Organizations (SOC 2) Type 1 audit. The final report, issued by one of the...
US charges 6 Russian intelligence men for global hacking campaign
The US Justice Department has charged six Russian intelligence officers with being part of an extensive worldwide hacking campaign, including the NotPetya ransomware attacks...
Security seen as cost overhead by digital payments stakeholders: Report
One of the key challenges to reducing frauds in India's digital payments ecosystem is that security is seen as a cost overhead and not...
Establishing Unified Endpoint Management in a hybrid work model
By Anand Iyer, Assistant Vice President & Global Delivery Head - Microsoft Business Applications & Modern Workplace, Infosys
Unified Endpoint Management (UEM) refers to solutions...
Prolific Ransomware Groups Intentionally Switch On Remote Encryption for Attacks, Sophos Finds
Sophos, a global leader in innovating and delivering cybersecurity as a service, today released a report, titled “CryptoGuard: An Asymmetric Approach to the Ransomware...
How to stay safe online on Black Friday
By Zakir Hussain
When the Black Friday craze engulfs the planet, people often throw caution aside for a good deal, opening a door for...
Ex-Uber chief security officer charged with covering up 2016 hack
A former Uber chief security officer has been charged in the US with allegedly covering up the massive 2016 hack that hit the ride-hailing...
Cisco patches critical bug in its Security Manager
Networking giant Cisco has disclosed a critical security vulnerability in Cisco Security Manager that could allow an unauthenticated, remote attacker to gain access to...
Researchers use ‘fingerprints’ tech to spot Russian hackers
Hackers too leave their fingerprints as they attack enterprises and individuals and cyber security researchers have now developed a new technique to “fingerprint” them,...