New Research from Lineaje Reveals Open-Source Software Security Gaps
Lineaje, a leader in software supply chain security management, released its new research report titled “What’s in Your Open-Source Software?” Compiled by the company’s...
Asigra Warns of RMM Ransomware Attack Vector
Leading cloud backup, recovery and restore software provider Asigra Inc., released a bulletin to the company's global network of managed service providers warning of...
VergeIO Adds New Ransomware Protection
VergeIO, the Ultraconverged Infrastructure (UCI) company, introduced a groundbreaking solution for ransomware protection – IOfortify. This latest innovation combines robust security; unlimited, unchangeable clones; and rapid, complete...
Is Remote Desktop Support Access Secure?
Allison Loy, Director of Channel Sales for TeamViewer Americas, shared her thoughts on the future outlook and collaboration in the digital-first space. Allison and...
Latest SonicWall Report Reveals Stealthier Threat Actor Behaviors
SonicWall, publisher of trusted cyberattack intelligence and leader of ransomware data, released the 2023 SonicWall Mid-Year Cyber Threat Report. The bi-annual report uncovers evolving...
ESET Launches Safer Kids Online, New Platform to Help Keep Kids and Parents Have...
ESET announced the launch of Safer Kids Online, a new resource platform for kids, parents and educators dedicated to building a safer online environment...
King & Union and Threat Intelligence Partners Form Coalition to Help Organizations Moving to...
King & Union has partnered with D3i and ThreatConnect to form a coalition offering access to their collaboration and threat intelligence services for free...
Lookout Announces New EDR Solution for MSSPs
Endpoint-to-cloud security company Lookout, Inc. announced the availability of Lookout Mobile Endpoint Security, the industry’s most advanced mobile endpoint detection and response (EDR) offering...
Avoiding QR Code and SMS Phishing
In October 2023, SlashNext Threat Labs published a blog post detailing how threat actors leverage QR codes for various attacks and breach attempts. More recently,...
ESET Researchers Discover First UEFI Rootkit Used In Cyberattack
The research team based in Montreal, discovered a cyberattack that used a UEFI rootkit to establish a presence on the victims’ computers, the first-ever in-the-wild. Dubbed...















