Cybersecurity investigator Brian Krebs put Wipro in a tough spot by bringing up a critical data breach in the midst of a quarterly earnings call. Wipro called the incident a zero-day attack and has employed a forensic investigator to probe the incident.
The new tools enable mobile-based options for employees to sign into corporate applications or create self-sovereign identities, access to which they control.
Around late Friday evening, Microsoft announced a data breach that resulted from a Microsoft technical support agent’s credentials being compromised.
The bears, pandas, kittens and chollimas are out in the open, and the military top-brass is apprehensive. Michael Sentonas, VP of Technology Strategy at CrowdStrike, gives us a dekko at the cyber espionage threat landscape.
New tools and services will help make it easier for enterprises to manage security with Google products as well as with Amazon and in their own private clouds and applications.
Security professionals in critical infra sectors across six countries revealed that 90 percent of them were hit by a cyber attack at some point in time, according to Ponemon Institute's latest research. We take a look at some of the most infamous ones.
The biggest ransomware attacks illustrate how this particularly nasty genre of attack software has grown from a curiosity and an annoyance to a major crisis.
Japanese automaker, Toyota, announced on Saturday that a data breach resulted in the data of 3.1 million customers being compromised. This is in fact the second data breach the company faced in the last five weeks.
At CISO summit, Kaspersky labs explains why it’s important to have 360-degree view of tactics and tools to maintain immunity towards unseen cyber-attacks.
A "low and slow" approach to financially driven cyber attacks has overtaken ransomware as the chief attack vector for criminals seeking to extort money by stealth using crypto mining-based malware, according to research by British cybersecurity upstart Darktrace.
Cloud App Security report reveals, email remains one of the most popular threat vectors. In total, the solution detected and blocked nearly 9 million high-risk email threats in 2018.