Last week, a major cyber attack crippled one of the largest pipelines in the United States (US), Colonial Pipeline, which carries about 45% of all fuel consumed on the country’s…
In last post we have discussed on one of the Application testing technique RASP , its functionality , importance, methods . Today we will discuss about another hidden technique used…
Remote browser isolation is a technology also referred to as web isolation or simply browser isolation. Remote browser isolation is an advanced cybersecurity technique that provides an additional layer of…
Recently Google implemented new security features to Gmail to address phishing threats, and now Microsoft is following suit with a planned update to Exchange. Via Microsoft's 365 Roadmap, the company…
Microsoft is warning of a large-scale BEC campaign that targeted more than 120 organizations with gift card scam. The attackers targeted organizations in multiple industries, including the consumer goods, process…
The handling of clicking on FTP links from within Firefox will soon be passed to other applications, as Mozilla will rip out Firefox's FTP implementation.Mozilla announced its intention to shortly…
Morpheus leverages machine learning to identify anomalies and threats such as phishing, data leaks and malware through real-time inspection of all IP traffic in an organization’s data centers. NVIDIA Morpheus…