MSPs Secure Their Environments with ESET
Roman Cuprik, Content Writer, ESET, explains that amidst increased obfuscation of multistage malware attacks, MSPsRead More…
Roman Cuprik, Content Writer, ESET, explains that amidst increased obfuscation of multistage malware attacks, MSPsRead More…
AmiViz, the Middle East region’s first enterprise B2B marketplace, today announced that the company has joined hands with PolySwarm, a first-of-its-kind marketplace for malware intelligence. PolySwarm has been onboarded to the AmiViz B2B PlatformRead More…
According to Check Point’s 2022 Security Report, there was a huge 650% year-on-year increase in supply chain attacks in 2021. Examples of high-profile supply chain attacks from last year include SolarWinds where a group of cybercriminals gained access to SolarWinds’ production environmentRead More…
Cybereason, announced the discovery of a new, highly targeted botnet campaign, using the stealthy, pervasive, Prometei Botnet, to target companies around the world with a multi-pronged attack that looks to steal bitcoin and data from corporate networks. The threat actor, a Russian speaker, is taking advantage of Microsoft Exchange vulnerabilitiesRead More…
SailPoint Technologies and Proofpoint have partnered to protect people’s data and inbox. As part of this partnership, joint customers can now further safeguard high-risk users by identifying and applying appropriate levels of access to critical systems and data. Secure access to sensitive applications and dataRead More…
Trend Micro announced today a partnership with CyberX, a government-backed initiative, to drive the Kingdom’s cybersecurity awareness.Read More…
Trend Micro has today released its 2019 security roundup report. According to which, ransomware continued to be a mainstay cyber threat last year. Overall, Trend Micro discovered a 10% increase in ransomware detections, despite a 57% decrease in the number of new ransomware families. TheRead More…
Asigra, a leading cloud backup, recovery and restore software provider recently announced that the Data Center Infrastructure Group (DCIG), has published a report titled “Creating a Secondary Perimeter to Detect Malware in Your Enterprise Backup Environment.”Read More…
Copyright © 2023 - Zarks Media. All rights reserved