Blog

Blog
The Automation Challenges in Identity Security: A Complex Issue Requiring Immediate Attention

For numerous organizations, identity security may seem adequately managed. On surface inspection, all indicators appear satisfactory. However, recent research by…

Blog
Sensitive Personal Data Compromised in West Lothian Ransomware Incident

West Lothian Council has reported a significant data breach involving the theft of both personal and sensitive information from its…

Blog
FBI Issues Alert on AI-Driven Impersonation Tactics Targeting Senior Officials

The FBI has issued a warning regarding an ongoing malicious campaign involving text and voice messages that impersonate high-ranking U.S….

Blog
Critical Security Vulnerabilities in Versa Concerto Enable Authentication Bypass and Remote Code Execution

Critical vulnerabilities have been identified in the Versa Concerto platform, which remain unpatched and pose significant risks. These vulnerabilities could…

Blog
Global Law Enforcement Agencies and Microsoft Disrupt Over 2,300 Lumma Stealer Domains

Microsoft has partnered with global law enforcement agencies to disrupt the infrastructure associated with one of the most prominent infostealer…

Blog
Western Logistics and Technology Firms Targeted by APT28.

Dozens of Western logistics and technology companies involved in delivering aid to Ukraine have faced targeted cyber-espionage attacks attributed to…