Looking Back and Moving Forward With Rapid7’s Cloud Security Solution
This blog post was co-authored by Jamie Gale and Charles Stokes. Done with Q1 The DivvyCloud by Rapid7 team has
Read moreThis blog post was co-authored by Jamie Gale and Charles Stokes. Done with Q1 The DivvyCloud by Rapid7 team has
Read moreGroup-IB, a global threat hunting and adversary-centric cyber intelligence company, discovered that user data of the Swarmshop card shop have been leaked
Read morePwn2Own 2021 – Day 2: a security duo earned $200,000 for a zero-interaction Zoom exploit allowing remote code execution. One
Read moreDays after a massive Facebook data leak made the headlines, 500 million LinkedIn users are being sold online, seller leaked 2 million
Read moreCisco has addressed a critical pre-authentication remote code execution (RCE) vulnerability in the SD-WAN vManage Software. Cisco has addressed multiple
Read moreThe maintainers of the PHP programming language confirmed that threat actors may have compromised a user database containing their passwords.
Read moreA joint operation of Europol and the Italian Postal and Communication Police resulted in the arrest of an Italian national
Read moreA timely warning to keep systems patched has appeared, via a jointly-released report from Onapsis and SAP. The report details
Read moreResearchers have discovered malware camouflaged as a Netflix application, prowling on the Google Play store, spread through WhatsApp messages.
Read moreSierra Wireless, a Canadian IoT solutions provider said that it has reopened its manufacturing site’s production after the company suffered
Read moreJust days after a Facebook data leak was revealed, security experts have discovered another one, this time the victim
Read moreIn January, Andrei Tyurin was sentenced to 12 years in prison for the largest theft of personal data of bank
Read moreA banking Trojan has been found out by cybersecurity researchers, which has targeted many organizations across the state of
Read moreColumbo is a computer forensic analysis tool used to simplify and identify specific patterns in compromised datasets. It breaks down
Read moreThe Deepfence Runtime Threat Mapper is a subset of the Deepfence cloud native workload protection platform, released as a community
Read moreOur fast-paced lives are fueled by innovative, cloud-native companies. We are able to watch our favorite programs and movies from
Read moreThe cloud security solutions market is growing rapidly, and there are many types of solutions to support your specific business
Read moreThe cloud security solutions market is growing rapidly, and there are many types of solutions to support your specific business
Read moreThis blog post is part of an ongoing series about evaluating Managed Detection and Response (MDR) providers. For more insights,
Read moreThe Pwn2Own 2021 hacking competition has begun and white hat hackers participants earned more than $500000 on the first day.
Read moreCrooks increasingly often use legitimate services such as Google Forms and Telegram to obtain user data stolen on phishing websites.
Read moreA new supply chain attack made the headlines, threat actors compromised at least one update server of smartphone maker Gigaset to
Read moreNot only the European Commission, but many other organizations of the European Union have been targeted by a cyberattack in
Read moreOn-premises SAP systems are targeted by threat actors within 72 hours after security patches are released, security SAP security firm
Read more