Sandstone CTO shares how to assess cyber risk in the cloud

Chaitanya Pinnamanemi discusses how visibility and prioritization are key to securing your digital attack surface and reducing cyber risk.
RSS Reader for Computer Security Articles

Chaitanya Pinnamanemi discusses how visibility and prioritization are key to securing your digital attack surface and reducing cyber risk.

Credit to Author: Hugh Aver| Date: Thu, 12 May 2022 19:38:04 +0000
What should be done to avoid becoming a ransomware victim a second time?
Read More
Credit to Author: Lily Hay Newman| Date: Thu, 12 May 2022 12:30:00 +0000
A biotech threat intelligence group is gaining supporters as urgency mounts around an overlooked vulnerable sector.
Read More
Credit to Author: Andy Greenberg| Date: Thu, 12 May 2022 11:00:00 +0000
A group of human rights lawyers and investigators has called on the Hague to bring the first-ever “cyber war crimes” charges against Russia’s most dangerous hackers.
Read More
Credit to Author: David Buxton| Date: Thu, 12 May 2022 15:43:31 +0000
Crypto hackers stole nearly $400 million in April + is the NFT party over? It’s episode 250 of the Transatlantic Cable!
Read MoreCredit to Author: Christopher Boyd| Date: Thu, 12 May 2022 15:38:26 +0000
Google are introducing virtual credit cards to the Chrome browser for users of their services in the US. We take a look at what’s in store.
The post Virtual credit cards coming to Chrome: What you need to know appeared first on Malwarebytes Labs.
Read MoreCredit to Author: Malwarebytes Labs| Date: Thu, 12 May 2022 15:22:23 +0000
The facial recognition and surveillance company was sued for earning off the back of people’s faceprints that were taken without consent.
The post Clearview AI banned from selling facial recognition data in the US appeared first on Malwarebytes Labs.
Read More![]()
FortiGuard Labs discovered a phishing campaign delivering fileless malware to steal sensitive information from a victim’s device. Read our analysis to find out more about how the campaign executes and maintains persistence on the victim’s device.