Malicious extensions: Avast detects new threats on the Chrome Web Store

Malicious extensions: Avast detects new threats on the Chrome Web Store

| | Security News
In the ever-evolving cybersecurity landscape, new threats emerge every day. Our team at Avast recently discovered a series of malicious browser extensions on the Chrome Web Store that are spreading adware and ...
The rise and fall of ransomware: Insights from Avast's Q1/2023 Threat Report

The rise and fall of ransomware: Insights from Avast’s Q1/2023 Threat Report

| | #popular, Security News
What’s on your computer right now?  Let’s make a list. Start with every work-related document you’ve used or created in the last six months. After that, perhaps your monthly budgets, pictures from ...
Putting a stop to ungoverned, unauthorized shadow access. by Byron Acohido

RSAC Fireside Chat: Reinforcing ‘Identity and Access Management’ to expose ‘shadow access’

The world of Identity and Access Management (IAM) is rapidly evolving. Related: Stopping IAM threats IAM began 25 years ago as a method to systematically grant human users access to company IT ...
Statistics by 2022 Cost of Insider Threats Global Report by the Ponemon Institute

Ekran System to Participate in Inaugural National Channel & MSSP Cyber Summit

Ekran System Inc. will join the inaugural National Channel & MSSP Cyber Summit in Chicago, Illinois. The event will take place at the Marriott Marquis Chicago in the Grand Horizon Ballroom on ...
Author Q&A: Former privacy officer urges leaders to prioritize security as part of cloud migration

Author Q&A: Former privacy officer urges leaders to prioritize security as part of cloud migration

Cyber threats have steadily intensified each year since I began writing about privacy and cybersecurity for USA TODAY in 2004. Related: What China’s spy balloons portend A stark reminder of this relentless malaise: ...
Meta's $1.3 Billion Fine, AI Hoax Hysteria, Montana's TikTok Ban

Meta’s $1.3 Billion Fine, AI Hoax Hysteria, Montana’s TikTok Ban

In this episode, we discuss Meta’s record-breaking $1.3 billion fine by the EU for unlawfully transferring user data, shedding light on the increasing risks faced by tech companies in violating privacy rules ...
Revolutionizing DMARC Solutions: Permission Management

Revolutionizing DMARC Solutions: Permission Management

EasyDMARC’s cloud-native platform has been evolving since we ... The post Revolutionizing DMARC Solutions: Permission Management appeared first on EasyDMARC ...
RSAC Fireside Chat: Uptycs emulates Google, Akamai to protect cloud-native apps and endpoints

RSAC Fireside Chat: Uptycs emulates Google, Akamai to protect cloud-native apps and endpoints

The inadequacy of siloed security solutions is well-documented. Related: Taking a security-first path The good news is that next-gen security platforms designed to unify on-prem and cloud threat detection and remediation are, ...

The Legacy of The Hacker Manifesto

I was 11 years young when The Hacker Manifesto was originally published in 1986 (yes, I’m that old). I had no idea about the manifesto at that age but several years later ...
GUEST ESSAY: A primer on NIST 207A — guidance for adding ZTNA to cloud-native platforms

GUEST ESSAY: A primer on NIST 207A — guidance for adding ZTNA to cloud-native platforms

Zero trust networking architecture (ZTNA) is a way of solving security challenges in a cloud-first world. Related: The CMMC sea change NIST SP 800-207A (SP 207A), the next installment of Zero Trust ...