
The new phishing tactic that exploits SOC fatigue
In recent years we have learned to train people to detect suspicious emails and to deploy filters that block known threats. However, there is a second line of defense that receive…
News on technological advances, startups and new trends

In recent years we have learned to train people to detect suspicious emails and to deploy filters that block known threats. However, there is a second line of defense that receive…

For more than a year, a Russian-speaking threat actor has run a campaign for human resources departments that combines social engineering with advanced evasion techniques to extra…

The safety of the network is no longer just a matter of blocking ports and filtering traffic: devices that are placed on the perimeter, such as new generation firewalls (NGFW), ha…

The United States Agency for Infrastructure and Cybersecurity (CISA) has raised the alarm about high-gravity vulnerability in Ivanti Endpoint Manager (EPM) and has ordered federal…

OpenAI is taking artificial intelligence beyond the text assistant to fully enter the daily routine of security teams: this week announced the deployment of Codex Security, an age…

In a recent operation documented by the MalBeacon cyberintelligence firm, the Ransomware group known as Velvet Temper (also traced as DEV-0504) used a mix of social deception and …

The acceleration of artificial intelligence in companies poses a challenge that can no longer be solved by technology alone: trained talent and processes are needed to ensure that…

In the world of managed service providers, scaling up cybersecurity offers is not just a technical issue: it is a business model exercise. Many managed service companies (MSP / MS…

A Ghanaian citizen pleaded guilty this week for his involvement in a vast network of scam that, according to the authorities, stripped victims in the United States of over $100 mi…