Blog

Will We Ever Get a Handle on API Security?

[ad_1] API Security , Video Also: Why We Should Care About the New York Times'…

Medusa and Akira Rage; Tortilla Disrupted

[ad_1] Fraud Management & Cybercrime , Ransomware Crypto-Malware Trackers Report a Surge in Known Ransomware…

Crypto bulls see bitcoin flying above $100,000 after ETF approval

Chesnot | Getty ImagesCryptocurrency bulls say bitcoin could surge to more than $100,000 this year…

Urgent: GitLab Releases Patch for Critical Vulnerabilities

[ad_1] Jan 12, 2024NewsroomDevSecOps / Software security GitLab has released security updates to address two…

BlackRock’s Larry Fink says bitcoin ETFs are just the first step in the technological revolution of finance

Bitcoin exchange-traded funds have arrived after a hard-fought battle between the crypto industry and the…

From Data Leaks to Multi-Extortion

[ad_1] The threat actors associated with the Medusa ransomware have ramped up their activities following…

Nation-State Actors Weaponize Ivanti VPN Zero-Days, Deploying 5 Malware Families

[ad_1] Jan 12, 2024NewsroomVulnerability / Threat Intelligence As many as five different malware families were…

Why Attack Simulation is Key to Avoiding a KO

[ad_1] Picture a cybersecurity landscape where defenses are impenetrable, and threats are nothing more than…

Cryptominers Targeting Misconfigured Apache Hadoop and Flink with Rootkit in New Attacks

[ad_1] Jan 12, 2024NewsroomCryptocurrency / Malware Cybersecurity researchers have identified a new attack that exploits…

CISA Flags Active Exploitation of Microsoft SharePoint Vulnerability

[ad_1] Jan 12, 2024NewsroomCyber Attack / Vulnerability The U.S. Cybersecurity and Infrastructure Security Agency (CISA)…