Screenshots that ransomware gang Lapsus$ released this week suggest the threat actor also stole Microsoft source code.
Mois : mars 2022
Report analyzes 30,000 threats in customer environments to uncover the trends, threats and techniques that comprised the...
Researchers have discovered a previously unknown macOS malware variant called GIMMICK, which is believed to be a...
As the war rages, the APT group with a long résumé of disruptive cyberattacks enters the spotlight...
Biden administration doubles down on its previous warnings of possible Russian cyberattacks in the wake of hefty...
Strong demand for application security that supports DevSecOps initiatives drives investment from Koch Disruptive Technologies and New...
A threat group combines the use of steganography, open source tools, and Python scripts to target organizations...
The latest three memory corruption flaws in Dell BIOS highlights the challenges of fixing firmware vulnerabilities.
If every application, device, and bot need access and authentication at some point, the need for managing...
Zscaler Unveils Security Service Edge Innovations to Protect Enterprises From Cyberattacks

1 min read
Advancements to the most deployed ZTNA solution strengthen the Zscaler Zero Trust Exchange with new private app...