In April 2024, Dragos researchers spotted the malware FrostyGoop that interacts with Industrial Control Systems (ICS) using the Modbus protocol. In April 2024, Dragos researchers discovered a new ICS... Read more »
Threat actors abused swap files in compromised Magento websites to hide credit card skimmer and harvest payment information. Security researchers from Sucuri observed threat actors using swap files in... Read more »
Australia is among the APAC governments forging closer ties with the private sector due to the realisation that the public sector can no longer fight the increase in cyber... Read more »
LOKKER released a new privacy solution for insurers: the ability to share on-demand web privacy risk reports with their insureds. These reports give insurers and the insured companies a... Read more »
Strata Identity announced Identity Continuity, an addition to its Maverics Identity Orchestration platform. This new premium offering ensures business continuity and uninterrupted application access by seamlessly failing over from... Read more »
Ketch launched its No-Code Rights Automation product, designed to make it easy for non-technical teams to comply with consumer requests for data deletion and access. This includes the full... Read more »
Secure Code Warrior introduced SCW Trust Agent – a solution that assesses the specific security competencies of developers for every code commit. This innovative offering enables CISOs and application... Read more »
Bitwarden’s affordability and extensive MFA options give it the slight edge over Dashlane’s uber-polished password management experience. Read more below. Read more »