Sensitive Information stories - Page 3
The role of Privilege Access Management in achieving robust cybersecurity
Mon, 5th Feb 2024
#
ransomware
#
pam
#
phishing
Privilege Access Management (PAM), with its ability to control key digital accounts, is proving crucial in combating rising cybersecurity threats posed by misuse of digital identities, a key source of business disruption.
Data Privacy Day sees phishing risk surge – report
Tue, 23rd Jan 2024
#
malware
#
ransomware
#
mfa
Ahead of Data Privacy Day, PrivacyEngines stresses increasing threat of phishing, with a staggering number of global attacks in Q3 2022.
CybeReady introduces new QR code phishing simulations
Thu, 18th Jan 2024
#
data analytics
#
cybersecurity
#
bi
CybeReady has introduced QR Code Phishing Simulations to its training suite, to arm businesses against the rising trend of quishing.
ReasonLabs uncovers cashback scam in torrented video game files
Thu, 28th Dec 2023
#
malware
#
gaming
#
endpoint protection
Cybersecurity firm ReasonLabs exposes massive cashback scam in torrented video games, compromising user's personal information.
AI advancements being exploited for email cyberattacks
Wed, 20th Dec 2023
#
malware
#
advanced persistent threat protection
#
email security
Cybercriminals are capitalising on the advancements in generative AI technology to conduct sophisticated email cyberattacks, says CISO of Abnormal Security.
SendQuick achieves top security certifications, reinforcing user data protection
Wed, 6th Dec 2023
#
advanced persistent threat protection
#
data privacy
#
cybersecurity
SendQuick earns ISO/IEC 27017:2015, ISO/IEC 27018:2019 and Cyber Trust Mark, bolstering user data security.
Cybercrime threat escalation prompts vigilance for Black Friday shoppers
Thu, 23rd Nov 2023
#
online shopping
#
fraud
#
cybercriminals
Alarming data shows cybercriminals escalating efforts to exploit Black Friday, with a 135% increase in fake retail sites.
Threat actor targets developers with malicious Python packages
Tue, 21st Nov 2023
#
edutech
#
application security
#
supply chain
Python developers targeted by malware disguised as obfuscation tools, granting attackers full control over victims' systems.
Malicious Python packages form serious security threat, Checkmarx study reveals
Mon, 13th Nov 2023
#
martech
#
application security
#
supply chain
Checkmarx study uncovers serious security risk posed by malicious Python packages used to hijack victim's computers.
Group-IB warns of rising Android Trojan threat in APAC
Mon, 16th Oct 2023
#
endpoint protection
#
advanced persistent threat protection
#
edr
Group-IB warns of rising cyber threats in Asia-Pacific, with advanced Android Trojan GoldDigger targeting Vietnamese banking apps.
MongoDB announces general availability of encryption technology
Thu, 17th Aug 2023
#
encryption
#
cybersecurity
#
healthtech
MongoDB has unveiled MongoDB Queryable Encryption, a technology that safeguards sensitive data when it is queried and used on the platform.
Video: 10 Minute IT Jams - An update from Varonis
Wed, 12th Apr 2023
#
data protection
#
hyperscale
#
martech
Varonis: protecting businesses from data breaches, ensuring compliance. VP Scott Leach tells us more about their offerings and data risk assessments.
Joshua Goodman named Regional Sales Manager
Fri, 2nd Sep 2022
#
edutech
#
cybersecurity
#
healthtech
Varonis appoints Joshua Goodman as Regional Sales Manager for NSW, QLD, ACT, and NZ. He brings a decade of experience in B2B software account management.
Are Kiwi firms exposing sensitive data to help desks?
Wed, 2nd Oct 2013
#
data analytics
#
martech
#
cdp
A New Zealand IT specialist is warning Kiwis phoning cloud software helpdesks that they may expose their data to unnecessary risk.
Juniper targets mobile threats
Wed, 27th Oct 2010
#
apm
#
software development
#
cloud services
Juniper has launched its Junos Pulse Mobile Security Suite, an all-encompassing software package aimed at protecting mobile devices against various threats.
Who's listening?
Thu, 1st Jul 2010
#
uc
#
firewalls
#
vpns
Security requirements and strategies apply to unifi ed communications solutions just as much as they do to traditional phone and email systems.