Recent news in security

  

Strategy for the Office Anywhere

Organizations must deploy a remote working strategy that suits the office anywhere model CIOs need to demonstrate leadership as we

  

The Oracle of Delphi Will Steal Your Credentials

Our deception technology is able to reroute attackers into honeypots, where they believe that they found their real target. The

  

Threats Making WAVs – Incident Response to a Cryptomining Attack

Guardicore security researchers describe and uncover a full analysis of a cryptomining attack, which hid a cryptominer inside WAV files.

Vendor

CERTs

Vulnerabilities