Microsoft has called on UK business leaders to “fight fire with fire” by adopting AI cybersecurity tools to defend themselves from cyberattacks.
Microsoft has called on UK business leaders to “fight fire with fire” by adopting AI cybersecurity tools to defend themselves from cyberattacks.
We’ve been offering our Security Onion documentation in book form on Amazon for a few years and it’s now been […]
The GoFetch vulnerability, which affects Apple’s M series of chips, allows an attacker to steal secret keys from the Mac under certain conditions. Read tips on mitigating the GoFetch security threat.
Understanding the tricky way that subdomain attacks use your email authentication against you.
In January 2019, the now defunct MMO and RPG game SwordFantasy suffered a data breach that exposed 2.7M unique email addresses. Other impacted data included username, IP address and salted MD5 password hashes.
Read this feature comparison of JumpCloud and Okta, two leading IAM softwares solutions that can help secure your business.
Looking for an alternative to Google Authenticator? Here’s our comprehensive list covering the top competitors and alternatives to help you find your best fit.
Auth0 and Okta are identity and access management software solutions, but which one should you choose? Dive into the specifics with this IAM tools feature comparison guide.
Delve into the world of Cisco XDR Playbooks, enhancing security operations with strategic guides and automation for robust incident response.
In March 2024, millions of rows of data from the New Zealand media company MediaWorks was publicly posted to a popular hacking forum. The incident exposed 163k unique email addresses provided by visitors who filled out online competitions and included names, physical addresses, phone numbers, dates of birth, genders and the responses to questions in the competition. Some victims of the breach subsequently received ransom demands requesting payment to have their data deleted.