"A software supply chain attack occurs when a cyber threat actor infiltrates a software vendor’s network and employs malicious code...
Read moreRansomware activity from CL0P, a newer entrant to the list of top ransomware groups, increased by 65%, according to Nuspire's...
Read moreCommvault announced the release of Commvault Platform Release 2023E packed with cutting edge new products and services for businesses that require...
Read moreFraudsters use AI chat tools to refine their techniques and expand their coercion tactics, according to a report by Sophos...
Read moreRansomware was in the headlines worldwide last year as cyberattacks hit a broad swathe of businesses and organisations, maliciously causing...
Read moreA new report by Sygnia uncovered that attacks led by the Night Sky and Cheerscrypt ransomware groups originated from the same...
Read moreA mass-spreading phishing campaign aimed at collecting Zimbra account users’ credentials was detected by ESET researchers. The ongoing campaign has...
Read moreCyberArk launched its unified CyberArk Identity Security Platform to better protect Indonesian organisations from growing attacks on human and non-human....
Read moreCyber threats like ransomware are increasing, and endpoints are more varied, numerous, and distributed than ever before. By following the...
Read moreThe Australian Cyber Security Centre (ACSC) has developed prioritised mitigation strategies, in the form of the Strategies to Mitigate Cyber...
Read moreFutureCISO serves the interests of the Chief Information Security Officer (CISO) and the information security profession. Its purpose is to provide relevant and timely industry insights around all things important to security professionals and organisations that recognize and value the importance of protecting the organisation’s data and its customers’ privacy.
Copyright © 2024 Cxociety Pte Ltd | Designed by Pixl
Copyright © 2024 Cxociety Pte Ltd | Designed by Pixl