Data Security Experts

Lazarus luring employees with trojanized coding challenges: The case of a Spanish aerospace company Lazarus luring employees with trojanized coding challenges: The case of a Spanish aerospace company

While analyzing a Lazarus attack luring employees of an aerospace company, ESET researchers..
ESET Research Podcast: Sextortion, digital usury and SQL brute-force ESET Research Podcast: Sextortion, digital usury and SQL brute-force

Closing intrusion vectors force cybercriminals to revisit old attack avenues, but also to look for..
Cisco Secure Access named Leader in Zero Trust Network Access Cisco Secure Access named Leader in Zero Trust Network Access

Discover why the security analysts at KuppingerCole named Cisco Secure Access a Leader in Zero..
10 tips to ace your cybersecurity job interview 10 tips to ace your cybersecurity job interview

Once you’ve made it past the initial screening process and secured that all-important interview,..
Can open-source software be secure? Can open-source software be secure?

Or, is mass public meddling just opening the door for problems? And how does open-source software..
Navigating the Challenges of Telecommunications for Businesses Navigating the Challenges of Telecommunications for Businesses

Discover the top challenges that businesses face with telecommunications and how to overcome them...
The Evolution of Telecommunications for Business: The Impact of Cloud Computing The Evolution of Telecommunications for Business: The Impact of Cloud Computing

Discover how cloud computing has transformed telecommunications for business, from cost savings to..
Benefits of Ingesting Data from Amazon Inspector into Cisco Vulnerability Management Benefits of Ingesting Data from Amazon Inspector into Cisco Vulnerability Management

Learn how you can ingest your cloud-specific vulnerability findings from Amazon Inspector into..
Is backdoor access oppressive? – Week in security with Tony Anscombe Is backdoor access oppressive? – Week in security with Tony Anscombe

Bills granting access to end-to-end encrypted systems, opportunity for cybercriminals, abuse by..
From Disinformation to Deep Fakes: How Threat Actors Manipulate Reality From Disinformation to Deep Fakes: How Threat Actors Manipulate Reality

Deep fakes are expected to become a more prominent attack vector. Here's how to identify them. What ..
Passwords out, passkeys in: are you ready to make the switch? Passwords out, passkeys in: are you ready to make the switch?

With passkeys poised for prime time, passwords seem passé. What are the main benefits of ditching..
Massive Androxgh0st Malware Breach Exposes Credentials Massive Androxgh0st Malware Breach Exposes Credentials

In the ever-evolving landscape of cybersecurity threats, the recent disclosure of a massive..
Comcast Data Breach Affects Nearly 36M People Comcast Data Breach Affects Nearly 36M People

  Hackers accessed Xfinity customers’ personal information by exploiting a vulnerability in..
The Importance Of IT Security: How Houston's IT Services Can Protect Your Business The Importance Of IT Security: How Houston's IT Services Can Protect Your Business

In today's digital age, IT security has become a crucial aspect for businesses of all sizes. With..
What to know about the MOVEit hack – Week in security with Tony Anscombe What to know about the MOVEit hack – Week in security with Tony Anscombe

The US government has now announced a bounty of $10 million for intel linking the Cl0p ransomware..
Researchers Warn of ReverseRAT Backdoor Targeting Indian Government Agencies Researchers Warn of ReverseRAT Backdoor Targeting Indian Government Agencies

A spear-phishing campaign targeting Indian government entities aims to deploy an updated version of ..
VMware Patches Critical Vulnerability in Carbon Black App Control Product VMware Patches Critical Vulnerability in Carbon Black App Control Product

VMware on Tuesday released patches to address a critical security vulnerability affecting its..
The Importance Of IT Security: Top IT Services In Raleigh To Keep Your Data Safe The Importance Of IT Security: Top IT Services In Raleigh To Keep Your Data Safe

In today's digital age, prevention is better than cure, especially when it comes to safeguarding..
3 Steps to Automate Your Third-Party Risk Management Program 3 Steps to Automate Your Third-Party Risk Management Program

If you Google third-party data breaches you will find many recent reports of data breaches that..
Android app breaking bad: From legitimate screen recording to file exfiltration within a year Android app breaking bad: From legitimate screen recording to file exfiltration within a year

ESET researchers discover AhRat – a new Android RAT based on AhMyth – that exfiltrates files and..
New S1deload Malware Hijacking Users' Social Media Accounts and Mining Cryptocurrency New S1deload Malware Hijacking Users' Social Media Accounts and Mining Cryptocurrency

An active malware campaign has set its sights on Facebook and YouTube users by leveraging a new..
Data Loss Prevention: A Comprehensive Guide to Protecting Your Data Data Loss Prevention: A Comprehensive Guide to Protecting Your Data

Data loss prevention (DLP) is a cybersecurity solution that identifies and helps prevent the unsafe ..
Protecting Against Phishing Attacks: What You Need to Know Protecting Against Phishing Attacks: What You Need to Know

Spam filters and secure email gateways are essential for preventing identity theft, as more..
The Benefits of Multi-Factor Authentication for IT Security The Benefits of Multi-Factor Authentication for IT Security

Multifactor Authentication (MFA) is an essential component of any strong IAM policy. It helps..
The Importance of Information and Cyber Security The Importance of Information and Cyber Security

Information security is essential for protecting data from being leaked, distorted or destroyed...
The Role of Access Controls in IT Security The Role of Access Controls in IT Security

Access control is an essential element of security that determines who can access certain data,..
Protecting Against Ransomware Attacks: What You Need to Know Protecting Against Ransomware Attacks: What You Need to Know

Learn how to protect yourself from ransomware attacks by scanning for security vulnerabilities,..
The Benefits of Regular Data Backups for Cybersecurity The Benefits of Regular Data Backups for Cybersecurity

Data backups are essential for cybersecurity as they can help protect against cyber attacks and..
What is industry 4.0 business intelligence? What is industry 4.0 business intelligence?

Industry 4.0 is revolutionizing the way companies manufacture, improve and distribute their..
What is the analysis of data to find trends and patterns? What is the analysis of data to find trends and patterns?

Data mining, sometimes referred to as knowledge discovery, is the process of filtering large..
What are the main purposes of business reports? What are the main purposes of business reports?

The objective of a business report is to provide a critical analysis of the company's monitoring in ..
What is the importance of business intelligence in customer satisfaction? What is the importance of business intelligence in customer satisfaction?

Predict customer demand Business intelligence can help business planners improve the accuracy of..
Tricks of the trade: How a cybercrime ring operated a multi‑level fraud scheme Tricks of the trade: How a cybercrime ring operated a multi‑level fraud scheme

A peek under the hood of a cybercrime operation and what you can do to avoid being an easy target..
Is the big 4 now the big 5? Is the big 4 now the big 5?

The Big 5 accounting firms were the largest accounting firms in the world until 2002.They were..
PlugX Trojan Disguised as Legitimate Windows Debugger Tool in Latest Attacks PlugX Trojan Disguised as Legitimate Windows Debugger Tool in Latest Attacks

The PlugX remote access trojan has been observed masquerading as an open source Windows debugger..
Black Hat USA 2023 NOC: Network Assurance Black Hat USA 2023 NOC: Network Assurance

The Black Hat Network Operations Center (NOC) provides a high security, high availability network..
Shocking Findings from the 2023 Third-Party App Access Report Shocking Findings from the 2023 Third-Party App Access Report

Spoiler Alert: Organizations with 10,000 SaaS users that use M365 and Google Workspace average over ..
The Dark Web Unveiled: Understanding Its Risks And How To Navigate Safely The Dark Web Unveiled: Understanding Its Risks And How To Navigate Safely

Ever heard the saying 'curiosity killed the cat'? Well, when it comes to the dark web, curiosity..
Common Online Threats And How To Stay Protected Common Online Threats And How To Stay Protected

Ready to navigate the treacherous waters of the online world? Brace yourself, for in this digital..
Protecting Your Identity Online: Essential Tips For Personal Information Security Protecting Your Identity Online: Essential Tips For Personal Information Security

Imagine this: you're walking down a busy city street, surrounded by strangers going about their..