Skip to content

Secure Your Digital Life

  • Home
  • Data Protection

Category: Data Protection

  • Home
  • Data Protection
  • Page 59
Data Protection

Effective Privileged Access Management Implementation: A Step-by-Step Guide

Over the last ten to fifteen years, the way we interact with technology at work has fundamentally shifted. Once, it was common to travel to

Read More
Data Protection

Darcula Adds GenAI to Phishing Toolkit, Lowering the Barrier for Cybercriminals

Apr 24, 2025Ravie LakshmananPhishing / Cybercrime The threat actors behind the Darcula phishing-as-a-service (PhaaS) platform have released new updates to their cybercrime suite with generative

Read More
Data Protection

GitHub secrets: Deleted files still pose risks

“I built an automation that cloned and scanned tens of thousands of public GitHub repos for leaked secrets,” Brizinov said in a blog post. “For

Read More
Data Protection

Linux ‘io_uring’ security blindspot allows stealthy rootkit attacks

A significant security gap in Linux runtime security caused by the ‘io_uring’ interface allows rootkits to operate undetected on systems while bypassing advanced Enterprise security

Read More
Data Protection

How to Defend Against the 10 Most Dangerous Privileged Attack Vectors

Supply chain attacks are becoming an increasingly common strategy for hackers. They’ll generally target organizations via third-party suppliers, partners, or vendors, all of whom might

Read More
Data Protection

Verizon DBIR: Small Businesses Bearing the Brunt of Ransomware Attacks

The majority of ransomware attacks target small businesses, according to Verizon’s latest Data Breach Investigations Report (DBIR), with extortion malware appearing in 88% of SMB

Read More
Data Protection

Critical Commvault Command Center Flaw Enables Attackers to Execute Code Remotely

Apr 24, 2025Ravie LakshmananData Breach / Vulnerability A critical security flaw has been disclosed in the Commvault Command Center that could allow arbitrary code execution

Read More
Data Protection

Google tells some remote workers to return to the office or risk losing jobs

Google has warned remote workers will need to return to the office or else lose their jobs, according to reports. Internal documents viewed by CNBC

Read More
Data Protection

From Risk Scoring to Dynamic Policy Enforcement Without Network Redesign

The Evolving Healthcare Cybersecurity Landscape Healthcare organizations face unprecedented cybersecurity challenges in 2025. With operational technology (OT) environments increasingly targeted and the convergence of IT

Read More
Data Protection

IBM puts on a brave face as US government cuts hit 15 contracts

IBM has revealed 15 contracts agreed with the US government have been shelved amid a cost-cutting drive implemented by the Trump administration. The tech giant

Read More

Posts pagination

Previous 1 … 58 59 60 … 201 Next
  • Fake AI video generators drop new Noodlophile infostealer malware
  • Microsoft Teams will soon block screen capture during meetings
  • What Is CaaS (Containers-as-a-Service)?
  • Where To Watch Why Women Kill for Free (Seasons 1 & 2) in 2025
  • Your Android phone is getting a new security secret weapon – and it’s a big deal
All Rights Reserved 2026.
Proudly powered by WordPress | Theme: Fairy by Candid Themes.