The Future of (Privileged) Access Management
In IT environments, some secrets are managed well and some fly under…
Europol Shuts Down Major Phishing Scheme Targeting Mobile Phone Credentials
Law enforcement authorities have announced the takedown of an international criminal network…
Hackers Exploit Default Credentials in FOUNDATION Software to Breach Construction Firms
Sep 19, 2024Ravie LakshmananCyber Attack / Hacking Threat actors have been observed…
Wherever There’s Ransomware, There’s Service Account Compromise. Are You Protected?
Until just a couple of years ago, only a handful of IAM…
Microsoft Warns of New INC Ransomware Targeting U.S. Healthcare Sector
Sep 19, 2024Ravie LakshmananHealthcare / Malware Microsoft has revealed that a financially…
New “Raptor Train” IoT Botnet Compromises Over 200,000 Devices Worldwide
Cybersecurity researchers have uncovered a never-before-seen botnet comprising an army of small…
Chinese Engineer Charged in U.S. for Years-Long Cyber Espionage Targeting NASA and Military
A Chinese national has been indicted in the U.S. on charges of…
4 Top Security Automation Use Cases: A Detailed Guide
With Gartner recently declaring that SOAR (security orchestration, automation, and response) is…
GSMA Plans End-to-End Encryption for Cross-Platform RCS Messaging
Sep 18, 2024Ravie LakshmananMobile Security / Encryption The GSM Association, the governing…


