Digital nomads drive changes in identity verification

Over the past year, 4 in 5 financial companies had experienced an increase in the number of verification cases involving foreign documents, according to Regula. The post Digital nomads... Read more »

Week in review: Zyxel firewalls vulnerability, phishing campaign targets ChatGPT users

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Wireless Broadband Alliance CEO on key drivers for Wi-Fi adoption in enterprise networks This... Read more »

Keysight E5081A ENA-X produces error vector magnitude measurements

Keysight Technologies introduces the Keysight E5081A ENA-X, the midrange vector network analyzer (VNA) that produces error vector magnitude (EVM) measurements and accelerates the characterization of 5G component designs by... Read more »

Edgewater Wireless launches MLX 488 WiFi7 Spectrum Slicing platform

Edgewater Wireless Systems has announced its next-generation of Wi-Fi Spectrum Slicing powered silicon solutions targeting residential, enterprise and prosumer applications. Building on the latest Wi-Fi standard, WiFi7 (802.11BE), Edgewater’s... Read more »

Hopr raises $500K to accelerate product-led go-to-market strategy

Hopr has secured $500K in funding from TEDCO, that has invested an additional $300K, doubling down on their initial investment of $200K, which occurred last year. “The outlook for... Read more »

Coalesce Partner Program helps automate the modern data stack

Coalesce has announced a new partner program to expand training options and teamwork, as well as to help Snowflake Data Cloud customers more effectively manage their modern data stack.... Read more »

Cognigy and Black Box partnership to accelerate deployment of conversational AI

Cognigy has entered into a strategic reseller partnership with Black Box. By combining Cognigy’s conversational AI-based technology with Black Box’s comprehensive CX solution practice, including a global network of... Read more »

Phishers use encrypted file attachments steal Microsoft 365 account credentials

Phishers are using encrypted restricted-permission messages (.rpmsg) attached in phishing emails to steal Microsoft 365 account credentials. “[The campaigns] are low volume, targeted, and use trusted cloud services to... Read more »

New Buhti ransomware uses leaked payloads and public exploits

A newly identified ransomware operation has refashioned leaked LockBit and Babuk payloads into Buhti ransomware, to launch attacks on both Windows and Linux systems. Use of public exploits One... Read more »

New infosec products of the week: May 26, 2023

Here’s a look at the most interesting products from the past week, featuring releases from Axiado, Delinea, Netscout, Radware, and Veriff. Delinea Cloud Suite updates reduce the risk of... Read more »
Subscribe to our Newsletter