After year over year increases in the number of reported data breaches, Risk Based Security has released the results of their Q1 2018 Data Breach QuickView Report, showing the number of breaches discl
Book a Demo
After year over year increases in the number of reported data breaches, Risk Based Security has released the results of their Q1 2018 Data Breach QuickView Report, showing the number of breaches discl
The Ponemon Institute surveyed nearly 1,400 IT and IT security practitioners in the United States, European Union and Asia-Pacific to understand the risk unprotected applications pose to businesses wh
Security researchers have spotted the first-ever ransomware exploiting Process Doppelgänging, a new fileless code injection technique that could help malware evade detection.
GDPR will take effect on May 25, a response to data breaches and demands for greater oversight relating to security of personal identifiable information (PII).
Google announced the release of an open-source framework and an SDK dubbed ‘Asylo’ that allows developers to build applications targeting trusted execution environments.
A padding oracle vulnerability in Oracle Access Manager (CVE-2018-2879) can be exploited by attackers to bypass authentication and impersonate any user account.
A team of security researchers has reportedly discovered a total of eight new "Spectre-class" vulnerabilities in Intel CPUs, which also affect at least a small number of ARM processors and may impact
IDC has revealed that only 10% of European businesses are ready to implement multi-cloud infrastructure, with the majority of businesses sticking to one cloud vendor.
Cybersecurity researchers from Trend Micro are warning users of a malicious Chrome extension which is spreading through Facebook Messenger and targeting users of cryptocurrency trading platforms to st
Researchers have demonstrated that it is possible to use a Rowhammer attack to remotely hack Android phones.Vulnerable smartphones can be targeted by tricking users into visiting a website hosting a m
A new phishing campaign was discovered sending more than 550 million emails within the first quarter of 2018, according to data from Vade Secure. The threat was discovered in early January and has pri
Microsoft announced the general availability of Azure Container Instances (ACI) – a serverless way to run both Linux and Windows containers. ACI offers an on-demand compute service delivering rapid de
With less than a month until the GDPR comes into force, many companies will not be ready when it takes effect on May 25th, 2018. 62% of IT Decision Makers (ITDMs) surveyed describe themselves as ‘conf
Schedule a call with our experts. Discover new technology and get recommendations to improve your performance.