Browsing Category
Cybersecurity
Infostealer Lumma Evolves With New Anti-Sandbox Method
A new version of the infamous information stealer Lumma has emerged with a sophisticated anti-sandbox technique.
Operating under…
Visibility Isn’t Enough; It’s What You Do with It That Counts
By Christina Richmond, Chief Strategy and Growth Officer, Inspira Enterprise
As cyber risks continue to grow and evolve (here’s…
Secretary Fined For Accessing Scores of Patient Records
A former NHS secretary has been fined by the data protection regulator after illegally accessing the medical records of over 150…
Russia’s APT29 Targets Embassies With Ngrok and WinRAR Exploit
Ukrainian security researchers have revealed a major new Russian cyber-espionage campaign which they claim may have been designed…
NCSC Announces New Standard For Indicators of Compromise
The UK’s National Cyber Security Centre (NCSC) has revealed details of its first RFC for standards body the Internet Engineering…
Embracing Zero Trust Architecture: A Critical Best Practice for…
By Walt Szablowski, Founder and Executive Chairman, Eracent
Summary: With the increasing frequency and sophistication of…
Four Years and a Pandemic Later: Have Agencies Become Cloud Smart?
By James Langley, Master Solutions Consultant, Hitachi Vantara Federal
June 2023 marked the four-year anniversary of the release…
Rethinking SASE: Why Migrate Cybersecurity from Cloud to Browser
By John “JP” Peterson, Chief Product Officer, High Wire Networks
Cyberthreats are the scourge of our day. Few would argue, but…
Black Friday: Scammers Exploit Luxury Brands to Lure Victims
involving the spoofing of luxury brands, including Louis Vuitton, Rolex, and Ray-Ban.
The hackers craft enticing emails promising…
FBI Lifts the Lid on Notorious Scattered Spider Group
The FBI and the Cybersecurity and Infrastructure Security Agency (CISA) have released a detailed cybersecurity advisory on the…