Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Your Lawyers Are Increasingly Targeted by Phishing Attacks, Ransomware

Researchers at Bitdefender warn that law firms are high-value targets for ransomware gangs and other criminal threat actors. Attackers frequently use phishing to gain initial access to an organization’s networks. “Phishing is one of the most common attacks in the legal field,” the researchers write. “Cybercriminals pose as legitimate entities, tricking employees into divulging sensitive information or clicking malicious links.

EP 61 - Put Your Name on It: Identity Verification and Fighting Fraud

Aaron Painter, CEO of NameTag, joins host David Puner for a conversation that covers several key themes, including the inadequacies of current identity verification methods, the rise of deep fakes and AI-generated fraud – and the importance of preventing identity fraud rather than merely detecting it. Aaron discusses the role of advanced technologies like cryptography, biometrics and AI in improving identity verification.

How Manufacturing Organizations Can Increase Their Cybersecurity

When Clorox was hit with a ransomware attack in 2023, the impact went beyond just the infected endpoints. Threat actors succeeded in taking many of the organization’s automated systems offline and impacted large retailers’ ability to order products from the manufacturer. There was significant operational downtime as it took Clorox over a month to contain the breach, and the resulting financial loss was in the tens of millions.

How Scalper Bots Evaded Detection to Snatch Oasis Tickets

At 8:00 on Saturday, 31st August 2024, millions of people were poised to be part of pop culture history. Four days earlier, on 27th August, seminal Britpop heavyweights Oasis shocked the music world by finally confirming their long-awaited reunion. The reconciliation of brothers Liam and Noel Gallagher sent fans into a frenzy. For millions worldwide, it was essential to get tickets to one of the 17 announced gigs. The demand was enormous.

CyberArk Recognized as a Leader in 2024 Gartner Magic Quadrant for PAM

Today, we’re exceptionally proud to announce our recognition as a Leader in the “2024 Gartner Magic Quadrant for Privileged Access Management (PAM)”1 for the sixth time in a row. CyberArk was positioned furthest in Completeness of Vision.

Who Can See My Internet Search and Browsing History?

Your internet search and browsing history can be seen by search engines, web browsers, websites, apps and hackers. You should protect your search and browsing history to keep your sensitive information, including your login credentials and financial data, safe from hackers. Continue reading to learn more about search and browsing history, who can see it and how you can keep it private.