Please turn on your JavaScript for this page to function normally.
wireless router
New SOHO router malware aims for cloud accounts, internal company resources

Cuttlefish, a new malware family that targets enterprise-grade small office/home office (SOHO) routers, is used by criminals to steal account credentials / secrets for AWS, …

GISEC
GISEC Global 2024 video walkthrough

In this Help Net Security video, we take you inside GISEC Global, which is taking place from April 23 to April 25, 2024, at the Dubai World Trade Centre. The video features …

GISEC
Photos: GISEC Global 2024

GISEC Global is taking place from April 23 to April 25, 2024, at the Dubai World Trade Centre. Here are a few photos from the event, featured vendors include: Waterfall …

HNS
Cloudflare partners with Booz Allen Hamilton to guide organizations under attack

Cloudflare announced a collaboration with Booz Allen Hamilton to support enterprises under attack by providing expedited Under Attack as a Service (UAaaS) with 30-Day Rapid …

HNS
Kyndryl partners with Cloudflare to help enterprises migrate to next-generation networks

Kyndryl and Cloudflare announced a Global Strategic Alliance, an expansion of their partnership, to enable enterprises to migrate and manage networks for multi-cloud …

HNS
Cloudflare Magic Cloud Networking simplifies security and management of public clouds

Cloudflare introduced Magic Cloud Networking, a simple, secure and scalable way for businesses to connect and secure their public cloud environments. To accelerate its …

HNS
Cloudflare announces Firewall for AI to help security teams secure their LLM applications

Cloudflare announced the development of Firewall for AI, a new layer of protection that will identify abuse and attacks before they reach and tamper with Large Language Models …

HNS
Cloudflare Defensive AI protects organizations against AI-enhanced attacks

Cloudflare announced Defensive AI, a personalized approach to securing organizations against the new wave of risks presented by emerging technology. Threat actors have begun …

API
APIs are increasingly becoming attractive targets

APIs, a technology that underpins today’s most used sites and apps, are being leveraged by businesses more than ever—ultimately opening the door to more online threats than …

corporate cybersecurity blogs
10 corporate cybersecurity blogs worth your time

In this article, we’ve curated a list of insightful corporate cybersecurity blogs that provide analysis and actionable advice to help you keep your company’s …

Okta breach post mortem reveals weaknesses exploited by attackers

The recent breach of the Okta Support system was carried out via a compromised service account with permissions to view and update customer support cases. “During our …

1Password
1Password also affected by Okta Support System breach

Following in the footsteps of BeyondTrust and CloudFlare, 1Password has revealed that it has been affected by the Okta Support System breach. “On September 29, we …

Don't miss

Cybersecurity news