Rise in automated attacks troubles ecommerce industry

Automated attacks on application business logic, carried out by sophisticated bad bots, were the leading threat for online retailers, according to Imperva. In addition, account takeover, DDoS, API abuse,... Read more »

LogicMonitor expands LM Envision platform to simplify multi-cloud complexities for CloudOps teams

LogicMonitor announced the extension of its LM Envision platform for CloudOps, optimizing how teams monitor hybrid and multi cloud environments. With leaders recently describing their monitoring tools as “chaotic,”... Read more »

Photos: IRISSCON 2023

IRISSCON, the annual cybercrime-themed conference organized by the Irish Reporting and Information Security Service (IRISS), was held in Dublin, Ireland, on November 16, 2023. Here’s a peak on what... Read more »

NodeSource launches N|Solid Copilot to streamline app development

NodeSource has launched the N|Solid Copilot, an AI assistant integrated into the Console of N|Solid Pro. Leveraging the N|Solid Pro platform to capture the telemetry for applications and paired... Read more »

42Crunch and Microsoft partner for streamlined API security governance

42Crunch has unveiled the integration of 42Crunch’s API security audit and vulnerability testing solution with Microsoft Defender for Cloud to provide Microsoft customers continuous API protection from design to... Read more »

Cohesity expands partnership with Microsoft to improve data restore capabilities for organizations

Cohesity announced it has deepened its relationship with Microsoft to help organizations more quickly respond to and recover from data loss within Microsoft 365 environments. For years, Cohesity and... Read more »

Crunchy Data and Center for Internet Security help businesses secure Postgres deployments

Crunchy Data in collaboration with the Center for Internet Security, announced the publication of the PostgreSQL CIS Benchmark for PostgreSQL 16. Crunchy Data worked with the Defense Information Systems... Read more »

From PKI to PQC: Devising a strategy for the transition

Quantum computers capable of breaking currently used encryption algorithms are an inevitability. And since the US, China and Europe are sprinting to win that arms race, we know that... Read more »

Telemetry gaps leave networks vulnerable as attackers move faster

Telemetry logs are missing in nearly 42% of the attack cases studied, according to Sophos. In 82% of these cases, cybercriminals disabled or wiped out the telemetry to hide... Read more »

Review: Cyberbunker: The Criminal Underworld

Written and directed by Kilian Lieb and Max Rainer, Cyberbunker is a Netflix documentary about a group of hackers that enabled the proliferation of dark web forums where illegal... Read more »
Subscribe to our Newsletter