Data Security Experts

The Expertise of Providers in Managed IT Security Services The Expertise of Providers in Managed IT Security Services

Discover the level of expertise that providers of managed IT security services have and why..
Scaling Up or Down: The Flexibility of Managed IT Security Services Scaling Up or Down: The Flexibility of Managed IT Security Services

Discover how businesses can scale up or down their level of managed IT security services as needed..
The Importance of Regular Vulnerability Assessments and Risk Management in Managed IT Security.. The Importance of Regular Vulnerability Assessments and Risk Management in Managed IT Security..

Learn about the role of managed IT security services in conducting regular vulnerability..
How Managed Security Service Providers Stay Updated on the Latest Cyber Threats and Technologies How Managed Security Service Providers Stay Updated on the Latest Cyber Threats and Technologies

Learn how managed security service providers stay updated on the latest cyber threats and..
How Managed Security Service Providers Ensure Data Privacy and Confidentiality How Managed Security Service Providers Ensure Data Privacy and Confidentiality

Learn how managed security service providers protect sensitive data and ensure confidentiality for..
Protecting Against Cyber Threats: The Role of Managed Security Service Providers Protecting Against Cyber Threats: The Role of Managed Security Service Providers

Learn how managed security service providers use advanced technologies and expertise to protect..
The Common Challenges Faced by Managed Security Service Providers The Common Challenges Faced by Managed Security Service Providers

Discover the common challenges faced by managed security service providers and how they overcome..
The Importance of Managed Security Service Providers in Today's Industries The Importance of Managed Security Service Providers in Today's Industries

Learn about the industries that typically use managed security service providers and the benefits..
The Ultimate Guide to Onboarding with Managed Security Service Providers The Ultimate Guide to Onboarding with Managed Security Service Providers

Learn about the process for onboarding with a managed security service provider and why it is..
IcedID Malware Shifts Focus from Banking Fraud to Ransomware Delivery IcedID Malware Shifts Focus from Banking Fraud to Ransomware Delivery

Multiple threat actors have been observed using two new variants of the IcedID malware in the wild..
Mass-spreading campaign targeting Zimbra users Mass-spreading campaign targeting Zimbra users

ESET researchers have observed a new phishing campaign targeting users of the Zimbra Collaboration..
Digital Forensics for Investigating the Metaverse Digital Forensics for Investigating the Metaverse

Exploring the Metaverse? Discover its hidden cybersecurity risks and stay protected. Dive into the..
Black Hat 2023: ‘Teenage’ AI not enough for cyberthreat intelligence Black Hat 2023: ‘Teenage’ AI not enough for cyberthreat intelligence

Current LLMs are just not mature enough for high-level tasks
Black Hat 2023: How AI changes the monetization of search Black Hat 2023: How AI changes the monetization of search

Search engines, AI, and monetization in the new era
AlienFox Malware Targets API Keys and Secrets from AWS, Google, and Microsoft Cloud Services AlienFox Malware Targets API Keys and Secrets from AWS, Google, and Microsoft Cloud Services

A new comprehensive toolset called AlienFox is being distributed on Telegram as a way for threat..
20k security folks in the desert – Week in security with Tony Anscombe 20k security folks in the desert – Week in security with Tony Anscombe

Unsurprisingly, artificial intelligence took the center stage at this year's edition of Black Hat,..
DEF CON 31: Robot vacuums may be doing more than they claim DEF CON 31: Robot vacuums may be doing more than they claim

When it comes to privacy, it remains complicated and near impossible for a consumer to make an..
Managing Firewall complexity and Augmenting Effectiveness with AIOps for Cisco Firewall Managing Firewall complexity and Augmenting Effectiveness with AIOps for Cisco Firewall

Explore how AIOps revolutionizes Cisco Firewall management, enhancing security, reducing downtime,..
Chinese RedGolf Group Targeting Windows and Linux Systems with KEYPLUG Backdoor Chinese RedGolf Group Targeting Windows and Linux Systems with KEYPLUG Backdoor

A Chinese state-sponsored threat activity group tracked as RedGolf has been attributed to the use..
Researchers Detail Severe Super FabriXss Vulnerability in Microsoft Azure SFX Researchers Detail Severe Super FabriXss Vulnerability in Microsoft Azure SFX

Details have emerged about a now-patched vulnerability in Azure Service Fabric Explorer (SFX) that..
Introducing the Open Supply-Chain Information Modeling (OSIM) Technical Committee Introducing the Open Supply-Chain Information Modeling (OSIM) Technical Committee

OSIM is a great advancement towards a more secure and resilient supply chain ecosystem.
How a Telegram bot helps scammers target victims – Week in security with Tony Anscombe How a Telegram bot helps scammers target victims – Week in security with Tony Anscombe

ESET researchers uncover a Telegram bot that enables even less tech-savvy scammers to defraud..
Getting off the hook: 10 steps to take after clicking on a phishing link Getting off the hook: 10 steps to take after clicking on a phishing link

Phishing emails are a weapon of choice for criminals intent on stealing people’s personal data and..
Gmail and Google Calendar Now Support Client-Side Encryption (CSE) to Boost Data Privacy Gmail and Google Calendar Now Support Client-Side Encryption (CSE) to Boost Data Privacy

Google has announced the general availability of client-side encryption (CSE) for Gmail and..
SysUpdate Malware Strikes Again with Linux Version and New Evasion Tactics SysUpdate Malware Strikes Again with Linux Version and New Evasion Tactics

The threat actor known as Lucky Mouse has developed a Linux version of a malware toolkit called..
Will you give X your biometric data? – Week in security with Tony Anscombe Will you give X your biometric data? – Week in security with Tony Anscombe

The update to X's privacy policy has sparked some questions among privacy and security folks,..
OilRig’s Outer Space and Juicy Mix: Same ol’ rig, new drill pipes OilRig’s Outer Space and Juicy Mix: Same ol’ rig, new drill pipes

ESET researchers document OilRig’s Outer Space and Juicy Mix campaigns, targeting Israeli..
Hackers Exploit Containerized Environments to Steal Proprietary Data and Software Hackers Exploit Containerized Environments to Steal Proprietary Data and Software

A sophisticated attack campaign dubbed SCARLETEEL is targeting containerized environments to..
Chinese Hackers Targeting European Entities with New MQsTTang Backdoor Chinese Hackers Targeting European Entities with New MQsTTang Backdoor

The China-aligned Mustang Panda actor has been observed using a hitherto unseen custom backdoor..
New FiXS ATM Malware Targeting Mexican Banks New FiXS ATM Malware Targeting Mexican Banks

A new ATM malware strain dubbed FiXS has been observed targeting Mexican banks since the start of..
The Future of Telecommunications: How Emerging Technologies are Shaping Business Communication The Future of Telecommunications: How Emerging Technologies are Shaping Business Communication

In this article, we will explore some of the emerging trends in telecommunications for business and ..
The Future of Telecommunications for Businesses: Embracing Remote Work The Future of Telecommunications for Businesses: Embracing Remote Work

Discover the power of telecommunications for businesses in today's fast-paced world. Learn how it..
The Importance of Compliance with Telecommunications Regulations for Businesses The Importance of Compliance with Telecommunications Regulations for Businesses

In today's digital age, telecommunications has become an integral part of running a successful..
5 free OSINT tools for social media 5 free OSINT tools for social media

A roundup of some of the handiest tools for the collection and analysis of publicly available data..
API security in the spotlight – Week in security with Tony Anscombe API security in the spotlight – Week in security with Tony Anscombe

Given the reliance of today's digital world on APIs and the fact that attacks targeting them..
7 tips for spotting a fake mobile app 7 tips for spotting a fake mobile app

Plus, 7 ways to tell that you downloaded a sketchy app and 7 tips for staying safe from mobile..
Shein's Android App Caught Transmitting Clipboard Data to Remote Servers Shein's Android App Caught Transmitting Clipboard Data to Remote Servers

An older version of Shein's Android application suffered from a bug that periodically captured and..
Explosive Vulnerabilities Found in SonicWall Firewalls Explosive Vulnerabilities Found in SonicWall Firewalls

The discovery of explosive vulnerabilities in SonicWall firewalls has sent shockwaves through the..
Nation-State Hackers Launch New FalseFont Malware, Threaten Defense Contractors Nation-State Hackers Launch New FalseFont Malware, Threaten Defense Contractors

The ever-evolving landscape of cybersecurity is once again under siege, as nation-state hackers..
Massive Data Breach Exposes Real Estate Elite Massive Data Breach Exposes Real Estate Elite

As a cybersecurity researcher, I recently stumbled upon a discovery that shook the real estate..