Generative Data Intelligence

Tag: Cryptocurrency Wallets

RSA 2022: Omdia Research Take Aways

It had been a few years, so with much anticipation, and not a little trepidation, 26,000 people descended on San Francisco for the RSA...

China-Backed APT Pwns Building-Automation Systems With ProxyLogon

A Chinese-speaking advanced persistent threat (APT) is exploiting the ProxyLogon Microsoft Exchange vulnerability to deploy the ShadowPad malware, researchers said — with the end...

Ransomware Volume Nearly Doubles 2021 Totals in a Single Quarter

After a 2021 beleaguered by ransomware, attack volumes continue to balloon in 2022. In fact, a report issued Tuesday indicates that in just the first...

How to Find New Attack Primitives in Microsoft Azure

Microsoft's cloud services revenue grew 46% in the first quarter of 2022, and its cloud market share has increased by almost 9% since 2017. With...

Top Six Security Bad Habits, and How to Break Them

Shrav Mehta, CEO, Secureframe, outlines the top six bad habits security teams need to break to prevent costly breaches, ransomware attacks and prevent phishing-based...

New Vulnerability Database Catalogs Cloud Security Issues

Organizations traditionally have struggled to track vulnerabilities in public cloud platforms and services because of the lack of a common vulnerability enumeration (CVE) program like...

Mitel VoIP Bug Exploited in Ransomware Attacks

Researchers warn threat actors are using a novel remote code execution exploit to gain initial access to victim’s environments. Ransomware groups are abusing unpatched...

Latest Intelligence

spot_img
spot_img
spot_img

Chat with us

Hi there! How can I help you?