Avast Q1/2022 Threat Report

Avast –  Avast –  Cyberwarfare between Ukraine and Russia The first quarter of 2022 is over, so we are here again to share insights into the threat landscape and what…

Avast Q4/21 Threat report

Avast –  Avast –  Welcome to the Avast Q4’21 Threat Report! Just like the rest of last year, Q4 was packed with many surprises and plot twists in the threat…

MobileIron customers urged to patch systems due to potential Log4j exploitation

Cybersecurity company NCC Group is warning users of MobileIron products to patch their systems since finding exploitations through the Log4j vulnerability.  more coverage NCC Group researchers have so far seen…

6 life-changing tech habits you need in 2022

This is the year you’re going to go to the gym three times a week, and you’re going to get organized, and you’re going to live life to its fullest,…

CISA, White House urge organizations to get ready for holiday cyberattacks

The Cybersecurity and Infrastructure Security Agency and the White House have released warnings to companies and organizations across the country, urging them to be on alert for cyberattacks ahead of…

60% of UK Workers Have Been Victim of a Cyber-Attack, Yet Awareness Remains Low

60% of UK Workers Have Been Victim of a Cyber-Attack, Yet Awareness Remains Low There is a “dangerous” lack of awareness among UK workers towards cybersecurity, leaving businesses at risk…

Online Shoppers Could Face Eight Million Credential Stuffing Attacks Per Day Over Christmas

Online Shoppers Could Face Eight Million Credential Stuffing Attacks Per Day Over Christmas Online shoppers in the UK will be hit by up to eight million credential stuffing attacks per…

Brazil investigates use of staff credentials in cyberattacks against government bodies

Following major cyberattacks against central government bodies in Brazil, initial investigations have found that malicious actors have used civil servant credentials to access systems. The finding is among a series…

What is SASE?

Cybersecurity frameworks and models are incredibly important and provide a consistent set of guidance, principles, and standards that security leaders can follow, use to build their roadmaps, and base their…

Log4j flaw: This new threat is going to affect cybersecurity for a long time

If there ever was any doubt over the severity of the Log4j vulnerability, director of US cybersecurity and infrastructure agency CISA, Jen Easterly, immediately quashed those doubts when she described…