Last year ESET published a blogpost about AceCryptor – one of the most popular and prevalent cryptors-as-a-service (CaaS) operating since 2016. For H1 2023...
Businesses using a managed detection and response (MDR) provider halved their median response time to a cyber incident and saw a commensurate — and dramatic...
The real-time payments industry is evolving and expanding. Today, real-time payments reach 65% of demand deposit accounts, and they are increasingly faster and more...
PRESS RELEASEWILMINGTON, Del.--(BUSINESS WIRE)-- CSC, an enterprise-class domain registrar and world leader in mitigating domain security, domain name system (DNS), and digital brand threats,...
The most recent ISC2 Cybersecurity Workforce Study found a shortfall of 111,000 professionals in the Middle East and Africa region. While that number pales...
Business Security Blindly trusting your partners and suppliers on their security posture is not sustainable – it’s time to take control through effective...
As innovation in artificial intelligence (AI) continues apace, 2024 will be a crucial time for organizations and governing bodies to establish security standards, protocols, and...
The International Criminal Police Organisation better-known as Interpol has announced the arrest of 3,500 alleged cybercriminals and scammers, alongside the seizure of $300 million...
Since 2005, Microsoft has released annual security intelligence reports, now known as the "Microsoft Digital Defense Report," as a way to track evolving cybersecurity...
Threat actors are abusing organizations' weak authentication practices to create and exploit OAuth applications, often for financial gain, in a string of attacks that...
The soaring costs of recovering from a security incident or data breach is driving interest in cyber insurance. While cyber insurance is typically viewed...
Every company should have a general incident response plan that establishes an incident response team, designates the members, and outlines their strategy for reacting...