News
Anyone accepting or sending ACH payments should understand common fraud techniques and take appropriate measures to curb them.
Cato CTRL has discovered previously unreported WormGPT variants, but with a twist — they are powered by xAI’s Grok and Mistral AI’s Mixtral.
In this episode, we explore the Kids Online Safety Act (KOSA), a controversial bill aimed at protecting children online. Joined by co-host Scott Wright, we discuss the potential implications of KOSA, ...
During exercises at CognectCon2025 a number of cyberattack scenarios were discussed that highlighted the risks of cyber attackers leveraging cognitive vulnerabilities to cause major impacts to nation ...
Are You Ready for the Future of Cybersecurity? Cybersecurity is not just about human identities anymore. A rising segment of digital focuses on non-human identities (NHIs) – a crucial feature in any ...
The prolific Scattered Spider threat group, which recently targeted U.S. and UK retailers in a series of attacks, is now ...
Cybernews researchers reported that since the beginning of the year, they've detected 30 datasets containing 16 billion stolen credentials exposed on the internet, most of which had not been ...
Amazon Web Services (AWS) this week revealed it has added new categories for describing offerings provided by partners offering managed services security providers (MSSP) as part of an effort to ...
What can public- and private-sector staff do to stay relevant and grow their career in the midst of AI-driven tech layoffs?
Why is NHI Management a Game Changer in Business Protection? Have you ever wondered how organizations manage to protect enormous amounts of data? An overlooked but vital component in data security is ...
Are Your Secrets Well Guarded in the Name of Data Security? Have you ever pondered the magnitude of secrets protection in your organizational data security framework? Non-Human Identities (NHIs) and ...
Are Your Cloud-Based Non-Human Identities as Secure as You Think They Are? We all want to believe that our cybersecurity measures are infallible. But in reality, our digital defense mechanisms – even ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results