Tag: EN

Rethinking Security in the Era of Hybrid Work

  Having witnessed hybrid work become a long-term reality instead of a temporary response to disruption, organisations are facing a tough question: how to safeguard a workforce that can now operate fluidly across offices, homes, devices, and networks without compromising…

Coro 3.6 reduces operational burden for resource-constrained SMBs

Coro announced the latest version of its platform. Coro 3.6 leverages AI to transform complex security into easy-to-use security for resource-constrained SMBs. Today, SMBs require a solution to enhance their security posture. Coro’s unified platform ensures that everything works together…

PTaaS Revolution: 10 Security Platforms Dominating 2025

The PTaaS revolution: Why everyone’s suddenly switching to these 10 game-changing security platforms in 2025 Today’s threat landscape exposes the limits of periodic testing. A 2023 CyberEdge report found that organizations ranked their patch management and pen testing capabilities the…

Why User Safety Should Be a Core SSO Design Principle

Explore why user safety should be the core of SSO design. Learn how MFA, encryption, and compliance keep authentication secure and trustworthy. The post Why User Safety Should Be a Core SSO Design Principle appeared first on Security Boulevard. This…

Using Artificial Intelligence for Strengthening Email Security

Today, email-based attacks are increasingly sophisticated, however artificial intelligence (AI) can offer vital defense. With AI use, organizations can counteract advanced phishing, ransomware, and business email compromise (BEC) schemes that… The post Using Artificial Intelligence for Strengthening Email Security appeared…

AsyncRAT Leverages Fileless Techniques to Bypass Detection

Fileless malware has become a formidable adversary for security teams, operating entirely in memory and evading disk-based detection. A recent incident demonstrates how attackers leveraged a multi-stage fileless loader to deploy AsyncRAT, a powerful Remote Access Trojan (RAT), through legitimate…