Top

Security researchers worldwide say the Snowflake breach will be for cloud identity attacks, which is like WannaCry was for ransomware. In July 2024, Snowflake, a leading cloud data warehousing company, experienced a significant security breach that sent shockwaves across the

Facebook hacks: Without a doubt, today, most lives are centred online, and Facebook is among the few social media platforms that serve both personal and professional lives. However, as the platform's popularity grows, so do the associated risks. Because threat

Money muling: Scams via apps and social media are numerous and very dangerous. In recent times, one that is all the rage is money mulling, which is sophisticated and can cheat many people by simulating plausible dynamics. It consists of

Are your applications bulletproof against today's sophisticated cyber threats? Engineers understand that robust application security is not optional—it's critical. Effective security testing methodologies, specific strategies, and industry best practices can significantly enhance your defences. How prepared is your organisation to

In recent years, data on the cloud has become the main target of cyberattacks. This phenomenon has pushed spending on protecting this data to the top of all other cybersecurity spending items. This is the finding of Thales's annual Cloud

Interview with Shobhit Gautam: Recently, NHS England confirmed a significant patient data breach managed by the pathology testing company Synnovis due to a ransomware attack. The cyber-criminal group Qilin has taken responsibility, releasing almost 400GB of private information on their

Security Information and Event Management (SIEM) systems have emerged as a crucial tool for organizations aiming to bolster their security posture. By providing real-time analysis of security alerts and aiding in the detection of anomalies, SIEM systems can significantly enhance

A recent survey conducted by Check Point and Cybersecurity Insiders provided insight into adopting and implementing artificial intelligence in the cybersecurity industry. The research surveyed hundreds of professionals from various industries, analyzing how AI is being used, how companies prioritize

The exponential growth in the volume of applications being developed, distributed, and patched across networks has entered an era of heightened vulnerability. Cyber hackers are always looking for vulnerabilities and will take advantage of anything that gives them access to

Loading