Category: EN

Enzoic AD Lite Password Audit Report

Enzoic for AD Lite Password Auditor is an innovative tool designed to integrate with an organization’s Active Directory environment seamlessly. Enzoic analyzed the 2024 AD Lite Password Auditor data to produce this report. New mandates and heightened awareness in 2024…

Data security and identity security themes at RSAC 2025

Check out what Enterprise Strategy Group analyst Todd Thiemann has on his agenda for RSA Conference 2025. This article has been indexed from Search Security Resources and Information from TechTarget Read the original article: Data security and identity security themes…

Ransomware Attacks Hit All-Time High as Payoffs Dwindle

While ransomware attack claims are at an all-time high, financial losses from actual attacks may be reducing This article has been indexed from www.infosecurity-magazine.com Read the original article: Ransomware Attacks Hit All-Time High as Payoffs Dwindle

U.S. CISA adds Gladinet CentreStack and ZTA Microsoft Windows Common Log File System (CLFS) Driver flaws to its Known Exploited Vulnerabilities catalog

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Gladinet CentreStack and ZTA Microsoft Windows Common Log File System (CLFS) Driver flaws to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added Gladinet CentreStack and ZTA Microsoft…

New GIFTEDCROOK Stealer Attacking Government Orgs To Steal Sensitive Data

Ukrainian government organizations are facing a sophisticated new cyber threat as threat actors deploy the recently discovered GIFTEDCROOK stealer malware to harvest sensitive data. Since February 2025, security researchers have been monitoring this concerning cyber-espionage campaign targeting military innovation hubs,…

Akamai boosts WAF protections across multiple environments

Akamai introduced App & API Protector Hybrid. Users can now expand the critical web application firewall (WAF) capabilities of Akamai’s web application and API protection (WAAP) while consistently securing applications and APIs for multicloud, on-premises, and CDN-agnostic environments. Security leaders are increasingly…