Data theft stories - Page 8
Kaspersky outlines forecast for 2024 cybersecurity threats
Wed, 22nd Nov 2023
#
supply chain
#
kaspersky
#
threat intelligence
Kaspersky predicts advanced cybersecurity threats for 2024 with AI-impersonation, new botnets, and potential political cyberattacks.
Google apps, WhatsApp identified as primary malware conduits in retail sector
Thu, 16th Nov 2023
#
phishing
#
email security
#
google
Google apps and WhatsApp emerge as primary malware distribution channels in the retail sector, warns Netskope Threat Labs.
Check Point reveals Global Threat Index with Formbook as top malware
Mon, 16th Oct 2023
#
malware
#
advanced persistent threat protection
#
cybersecurity
Cybersecurity leader Check Point unveils Global Threat Index, identifying Formbook as September's dominant malware.
Volume, sophistication and proliferation of threats on the rise
Thu, 14th Sep 2023
#
edutech
#
cybersecurity
#
r&d
Integrity360 has announced findings from independent research into the cybersecurity threats being faced, the volume, and the challenges with incident response.
Video: 10 Minute IT Jams - Another update from Mandiant
Fri, 18th Aug 2023
#
ransomware
#
advanced persistent threat protection
#
breach prevention
Mandiant's CTO, Charles Carmakal, discusses cyber security, threat intelligence, and projects in the APAC region.
Exabeam's Outcomes Navigator aids threat detection coverage
Wed, 28th Jun 2023
#
siem
#
advanced persistent threat protection
#
socs
Outcomes Navigator is an advanced visualisation feature that goes deep into logs to visualise and expose where organisations are and isn't protected.
Video: 10 Minute IT Jams - Who is CrowdStrike?
Tue, 22nd Sep 2020
#
uc
#
endpoint protection
#
cloud security
CrowdStrike, a cybersecurity firm, discusses its key products and offerings in an interview with TechDay. Find out more.
99% of Android mobile phones susceptible to newly found takeover attack
Sat, 6th Jul 2013
#
malware
#
cybersecurity
#
software updates
Recent vulnerability means that 99% of all android phones could be exploited to the point where they could be completely overidden.