Category: EN

Fortinet to Expand AI, Cloud Security with Lacework Acquisition

Fortinet, known for network security capabilities within its Fortinet Security Fabric cybersecurity platform, is bolstering its AI and cloud security capabilities with the planned acquisition of Lacework and its AI-based offerings. The companies announced the proposed deal Monday, with expectations…

Free Android VPNs Suffering Encryption Failures, New Report

VPN apps for Android increase privacy and security over the internet since connection data is encrypted, consequently making it impossible for hackers or other parties to access communication data.  They also help unblock region-restricted content through IP address hiding, support…

Microsoft Revises AI Feature After Privacy Concerns

  Microsoft is making changes to a controversial feature announced for its new range of AI-powered PCs after it was flagged as a potential “privacy nightmare.” The “Recall” feature for Copilot+ was initially introduced as a way to enhance user…

KELA’s TPRM module identifies software supply chain risks

KELA launched the Third-Party Risk Management (TPRM) module, fully integrated into its threat intelligence platform. This new offering is specifically designed to strengthen organizational defenses by focusing on software supply chain risks. KELA’s TPRM module stands out in the market…

Ransomware Is ‘More Brutal’ Than Ever in 2024

As the fight against ransomware slogs on, security experts warn of a potential escalation to “real-world violence.” But recent police crackdowns are successfully disrupting the cybercriminal ecosystem. This article has been indexed from Security Latest Read the original article: Ransomware…

Elevating threat detection and response to a new level

Cybersecurity platforms have emerged as indispensable assets for threat detection, response and management. They proactively keep tabs on network traffic, user behaviour and system activities to identify and mitigate risks before they escalate into potentially catastrophic breaches. Yet, the efficacy…

1-15 March 2024 Cyber Attacks Timeline

In the first timeline of March 2024, I collected 98 events, once again characterized malware and ransomware attacks. State-sponsored threat actor were equally quite active, but the timeline also features some interesting events related to cyberwarfare. This article has been…

Tips to prevent data breaches

Tips to Prevent Data BreachesCould the Ticketmaster Data Breach Been Prevented?In a recent regulatory filing to the US Securities And Exchange Commission (SEC) , Live Nation, the parent company of Ticketmaster, revealed a distressing development: a criminal threat actor attempted…