Safari 15 implements the IndexedDB API, which introduces a data leak that allows websites to track the user’s internet activity and disclose their identity. FingerprintJS reported […]
Many companies use cloud apps like Microsoft 365, Google G Suite, and Salesforce without adequately protecting the data within those apps. Learn why this is problematic […]
What happens when a data leak or data breach occurs? Even the largest organizations are susceptible to them. We take a look at what they are, how hey happen, and how you can prevent them in our latest blog post.
Quick Response (QR) codes have become a standard method of conducting contactless transactions during the COVID-19 pandemic. However, cyber criminals are exploiting the lax security that […]
Have you heard of Zero Trust network security strategies? They represent the cutting-edge of internal network security. If your IT strategy doesn't include a Zero Trust strategy you might not be fully protected.
Cybercriminals have recently increased their use of banking trojans, which continue to become more effective as they evolve. For example, Brazilian Remote Access Tool Android (BRATA) […]
The Cybersecurity and Infrastructure Security Agency (CISA) and its partners are responding to the widespread exploitation of a critical remote code execution (RCE) vulnerability in Apache’s […]