Skip to content

Secure Your Digital Life

  • Home
  • Data Protection

Category: Data Protection

  • Home
  • Data Protection
  • Page 64
Data Protection

Android Spyware Disguised as Alpine Quest App Targets Russian Military Devices

Apr 23, 2025Ravie LakshmananSpyware / Mobile Security Cybersecurity researchers have revealed that Russian military personnel are the target of a new malicious campaign that distributes

Read More
Data Protection

Marks & Spencer räumt Cyberangriff ein

Das britische Traditionsunternehmen Marks & Spencer wurde offenbar von Cyberkriminellen heimgesucht. WD Stock Photos | shutterstock.com Wie Marks & Spencer (M&S) im Rahmen eines “Cyber

Read More
Data Protection

BenQ PD3226G monitor review | IT Pro

Ask us to recommend a monitor that’s great for business, and we can supply a long list. Ask us to recommend a monitor that’s both

Read More
Data Protection

Dutch Warn of “Whole of Society” Russian Cyber-Threat

Russia is ramping up cyber-attacks on the Netherlands and its allies in a bid to “disrupt and weaken our society,” Dutch intelligence services have warned.

Read More
Data Protection

Iran-Linked Hackers Target Israel with MURKYTOUR Malware via Fake Job Campaign

The Iran-nexus threat actor known as UNC2428 has been observed delivering a backdoor known as MURKYTOUR as part of a job-themed social engineering campaign aimed

Read More
Data Protection

Attackers abused a bug within SSL.com to authorize fake certificates

“SSL.com acknowledges this bug report and we are investigating further,” Rebecca Kelly, technical project manager at SSL.com, commented on the demonstration, quickly following with, “Out

Read More
Data Protection

Executives think AI can supercharge cybersecurity teams – analysts aren’t convinced

Sentiment over how AI can benefit security teams varies greatly between executives and analysts, with new research highlighting a growing divide over the technology. As

Read More
Data Protection

Vulnerability Exploitation and Credential Theft Now Top Initial Access

Phishing has declined as a method of initial access in 2024 and is now behind credential theft and vulnerability exploitation, according to Mandiant’s M-Trends 2025

Read More
Data Protection

What Is a Privileged Access Management Policy? Guidelines and Benefits

Creating and implementing a robust Privileged Access Management policy is not a one-time task. First of all, the PAM policy definition and enforcement mechanisms must

Read More
Data Protection

Three Reasons Why the Browser is Best for Stopping Phishing Attacks

Phishing attacks remain a huge challenge for organizations in 2025. In fact, with attackers increasingly leveraging identity-based techniques over software exploits, phishing arguably poses a

Read More

Posts pagination

Previous 1 … 63 64 65 … 201 Next
  • Fake AI video generators drop new Noodlophile infostealer malware
  • Microsoft Teams will soon block screen capture during meetings
  • What Is CaaS (Containers-as-a-Service)?
  • Where To Watch Why Women Kill for Free (Seasons 1 & 2) in 2025
  • Your Android phone is getting a new security secret weapon – and it’s a big deal
All Rights Reserved 2026.
Proudly powered by WordPress | Theme: Fairy by Candid Themes.