A sophisticated cyberattack uses fake PayPal security alerts, starting with phishing emails and escalating through phone-based social engineering to install…
Read More »endpoint security
A major data breach can cripple business operations for up to two weeks and cost millions of dollars, highlighting the…
Read More »The DeadLock ransomware campaign uses a BYOVD technique, exploiting a known vulnerability (CVE-2024-51324) in a Baidu Antivirus driver to disable…
Read More »Morphisec's Anti-Ransomware Assurance Suite has been upgraded with new features, including Network Share Ransomware Protection, Identity Risk Visibility, and enhanced…
Read More »Rapid adoption of AI, SaaS, and personal devices is reshaping work, but traditional security measures like SSO and IAM are…
Read More »Nozomi Networks has upgraded its Arc platform to include automated threat prevention for operational technology, enabling active defense of critical…
Read More »Nozomi Networks has launched automated threat prevention in its Nozomi Arc platform, providing the industry's first safe, automated response solution…
Read More »A critical zero-day vulnerability (CVE-2025-61932) in Lanscope Endpoint Manager is being actively exploited, primarily targeting Japanese customers since April 2025.…
Read More »Absolute Security's Rehydrate enables businesses to remotely restore compromised endpoints at scale, often in under 30 minutes, reducing downtime and…
Read More »A server migration failure due to neglected backup protocols allowed ransomware to enter through an unprotected workstation, encrypting files with…
Read More »Absolute Security has upgraded its Absolute Resilience Platform with an AI-powered assistant and real-time risk management tools, enabling natural-language interactions…
Read More »Security teams are alert as attackers exploit unpatched vulnerabilities (CVE-2025-54948 and CVE-2025-54987) in Trend Micro's Apex One, risking remote code…
Read More »Endpoint security is crucial as cyber threats target corporate devices, IoT, and supply chains, with gaps in protection leaving enterprises…
Read More »











