News

Providers and users can now easily and automatically check the cybersecurity and compliance of the software in their networked devices, machines, and systems using a platform solution that complies ...
The 15th edition of the State of Software Security report, based on a comprehensive dataset of 1,3 million unique applications and 126,4 million raw data points, highlights key trends and provides a ...
Certificate-related risks can cause problems in business operations. That's why the market leader in digital trust has now developed a solution that helps security teams manage their certificates and ...
Companies that rely on proactive security demonstrably reduce their risk, as reflected in the Cyber Risk Index (CRI) study. Risky access to cloud applications and the use of outdated Microsoft Entra ...
Li-Cybercriminals li ntse li sebelisa hampe lisebelisoa tsa ho lekola le tsa taolo tse hole (RMM) tseo ha e le hantle li reretsoeng ho lokisoa hole. Ka tsela ena, ba kenella lits'ebetsong tsa likhoebo ...
Using business email addresses for private purposes poses a significant risk. Many bank employees also surf the web using company email addresses. Four percent of them use adult portals and two ...
MSPs often manage Microsoft 365 security for their clients using multiple point solutions. This is inefficient and time-consuming. A leading security solutions provider now offers them an easy-to-use ...
Data security vs. legal certainty: Due to the political reality in the US, companies must evaluate transatlantic data transfers and avoid potential risks. This current German-language white paper ...
Cybercriminals are increasingly abusing remote monitoring and management (RMM) tools, which are supposedly designed for remote maintenance. They use this method to penetrate corporate systems via ...
A new ransomware attack by the well-known cybercriminal group RedCurl specifically targets hypervisors rather than endpoints. The attackers aim to remain undetected for a long time while causing ...
The digital threat landscape is evolving rapidly, and small and medium-sized businesses are constantly facing new challenges. Cybercriminals are now using artificial intelligence (AI) to specifically ...
Compromised credentials are the leading cause of cyberattacks for the second year in a row. The Sophos Active Adversary Report shows that in 56 percent of the analyzed attack cases, cybercriminals ...