Unpatched vulnerabilities are a gateway for hacker intrusions. They make cybercriminals’ jobs easy to break into targeted network systems. Cybersecurity experts from security firm SonarSource recently uncovered two critical vulnerabilities in Zimbra’s enterprise webmail solution that could allow an...
Whether it’s to gain fame or obtain a large amount of private data, threat actors often target government agencies. Recently, Florida's Department of Economic Opportunity (DEO) revealed that it has sustained a data breach that targeted its unemployment benefits...
Pegasus spyware from the NSO Group has made it to the global mainstream media, thanks to it being at the core of a major surveillance campaign reported by 17 media organizations led by the Paris-based group, Forbidden Stories and...
Adversaries often target users with various phishing tactics. But sometimes, unwitting users fall into a hacker’s trap, revealing their private data to attackers. Cybersecurity researchers from Bitdefender recently identified a new malware variant that targets users who are looking...
Mobile devices and the apps that live on them are finally being recognized as serious threats to enterprise security. Three-fifths of the senior professionals responsible for the procurement, deployment, and security of mobile devices say that they are their...
From banking to e-commerce and retail to restaurant chains, it’s imperative for every business to have a digital presence on the internet today. However, the advantage of online presence comes with a cost -- security risks to a company’s...
Mistakes are inevitable, but intentional acts may result in severe repercussions. Uber’s negligence of hiding a data breach took the taxi-aggregator to multiple wrong roads. The Office of the Australian Information Commissioner (OAIC) recently revealed its findings on the...
No company wants to put its business at risk. Indeed, we all strive for success, while continually trying to mitigate risk. The key to enabling this lies in protecting and preventing cyberattacks on networks, devices, applications, and data.
By Mucteba...
Technology is progressing at an astounding rate, and while at it, it is also connecting the digital world in a way never seen before. Implementation of technologies such as the Internet of Things (IoT), cloud computing, etc. has changed...
Like ransomware attacks, cyber espionage campaigns are fatal and can cause irreparable damage to enterprise IT security perimeter. Government and organizations must enforce robust security measures to identify cybercriminal operations before they exploit a company’s security architecture.
Recently, the French...














