Majority of Browser Extensions Can Access Sensitive Enterprise Data, New Report Finds
Apr 15, 2025The Hacker NewsData Privacy / Enterprise Security Everybody knows browser…
A Deep Dive Into AI & NHI
Apr 10, 2025The Hacker NewsAI Security / Enterprise Security AI agents have…
Breaking Through the Security and Compliance Gridlock
AI holds the promise to revolutionize all sectors of enterpriseーfrom fraud detection…
Microsoft Adds Inline Data Protection to Edge for Business to Block GenAI Data Leaks
Mar 24, 2025Ravie LakshmananEnterprise Security / Browser Security Microsoft on Monday announced…
CISA Adds Microsoft and Zimbra Flaws to KEV Catalog Amid Active Exploitation
Feb 26, 2025Ravie LakshmananEnterprise Security / Vulnerability The U.S. Cybersecurity and Infrastructure…
Russian-Linked Hackers Using ‘Device Code Phishing’ to Hijack Accounts
Microsoft is calling attention to an emerging threat cluster it calls Storm-2372…
What’s Effective and What’s Not – Insights from 200 Experts
Jan 29, 2025The Hacker NewsThreat Detection / Artificial Intelligence Curious about the…
Custom Backdoor Exploiting Magic Packet Vulnerability in Juniper Routers
Jan 23, 2025Ravie LakshmananMalware / Enterprise Security Enterprise-grade Juniper Networks routers have…
How to Eliminate Identity-Based Threats
Despite significant investments in advanced technologies and employee training programs, credential and…


