Sophos’ Active Adversary Playbook 2022 shows increase due to exploitation of ProxyLogon and ProxyShell vulnerabilities, plus initial access brokers
Read moreWinDealer attackers, specifically, used a man-on-the-side attack to read traffic and insert new messages.
Read moreWith all the trust issues surrounding deepfakes, users can wonder how to spot a deepfake. Here are some tips to...
Read moreAccording to Steve Flynn, Sales and Marketing Director, ESET Southern Africa, it’s long past time organisations get a handle on...
Read moreWema Bank and Bet9ja are under investigation in line with Section 37 of the 1999 Constitution and the provisions of...
Read moreTargeted attacks in 2021 were detected in each vertical represented in the research, except for education and mass media, even...
Read moreIn today’s world, ‘well prepared’ will never mean ‘invulnerable’. Faced with such a rapidly evolving threat landscape, it’s virtually impossible...
Read moreRegion’s Leading Value-Added Distributor to Bring Spirion’s Privacy-Grade Data Protection Solutions to Public and Private Sector Enterprises
Read moreTotal number of DDoS attacks fell 13% in 2021 over 2020, but still far above pre-pandemic levels, according to Nexusguard
Read moreThe UEFA Champions League final between Liverpool and Real Madrid will take place on May 28. This is a massive...
Read moreSweeps All Product, Innovation and Market Ratings; Commended as an Overall Leader
Read moreThe Nigerian Communications Commission (NCC) has advised telecom consumers and other Information and Communications Technology (ICT) end users on the...
Read moreCompared to Q1 2021, the number of Distributed Denial of Service (DDoS) attacks in Q1 2022 rose 4.5 times with...
Read more“Please review the attached file”: Using HTML attachments allows phishers to avoid detection, says Kaspersky report
Read moreNCC Warns telecom consumers of vulnerability to new Android trojan apps
Read more© 2025 TECHECONOMY.