MS Excel Vulnerability Exploited To Distribute Agent Tesla

Threat actors with malicious intent have now been exploiting an old MS Excel vulnerability as part of their phishing campaign. The aim of such exploits is to deliver an infostealer malware dubbed ...
The Layers of API Security

The Layers of API Security

There’s no arguing that the API ecosystem has become a key enabler for businesses. Leveraging APIs has helped companies become more agile, grow faster, and unlock more revenue. However, companies must also ...
Reasons Why Healthcare Industry is the Biggest Target for Cyber Attacks

Reasons Why Healthcare Industry is the Biggest Target for Cyber Attacks

Recent times have shown the growing implementation of technology in many industries and sectors. The Healthcare sector has gracefully embraced this advent of technological progress. The aim of embracing advanced technology, including ...
Another look at NYDFS Cybersecurity Regulations…

Another look at NYDFS Cybersecurity Regulations…

It’s been almost five years since the Final NYDFS Regulation, covered entities have now transitioned to a compliance phase. Let’s take a look at the current state of the regulation, but first ...
Data Security Risks in The Next Decade and How to Prepare for Them

Data Security Risks in The Next Decade and How to Prepare for Them

Almost all decisions and strategies in modern organizations are data-driven. Data breaches that make the data inaccessible can therefore tamper with normal company operations. Also, if it gets in the wrong hands, ...