News

Microsoft reveals how the cybercrime group, also known as Octo Tempest, is reversing its previous cloud-first strategy.
The administration has signaled a potential softening of cyber regulation for domestic entities, with increasing focus on national security ...
Threat actors are using anti-box tools, AI, and cloaking-as-a-service tactics to bypass security tools by showing a phishing or other malicious site to targets and harmless ones to detection and ...
Data breaches rage on. In the first half of this year, the Identity Theft Resource Center counted 1,732 total data breaches affecting 166 million people, marking a ...
Research from data back up specialist Veeam indicates that the vast majority of European financial services firms do not feel ...
StrongestLayer, a cybersecurity company developing AI-native email security and human risk solutions, today officially launched from stealth with $5.2 million in seed funding led by Sorenson Capital ...
According to new research from SlashNext, Platforms like Hoax Tech and JS Click Cloaker are offering “cloaking-as-a-service” ...
Experts speak out on ITWeb TV By Christopher Tredger, Portals editorJohannesburg, 17 Jul 2025Samantha Hanreck, associate consultant for AI business strategy at the Cyber Security Institute and Rejoice ...
Discover how CTEM, VM, and ASM work together to enhance cybersecurity, providing real-time visibility and proactive threat ...
Enterprise attack surfaces are expanding rapidly. To keep up, cybersecurity must evolve—moving from siloed tools to unified, ...
By: Richard Ford - Chief Technology Officer at Integrity360 Despite the escalating sophistication of AI-generated threats and the looming specter of quantum computing capable of shattering current ...
These engagements add to recent ThreatLocker participation in Middle East events in Bahrain, Saudi Arabia, Oman, and Kuwait ...