Trending Now
Featured news
World Economic Forum: Deepfake Face-Swapping Tools Are Creating Critical Security Risks
Researchers at the World Economic Forum have shown that threat actors can use commercial deepfake tools to bypass corporate security protections - Read...
Tech News
Tech
Identitäten im Fokus von Cyberkriminellen
Cyberkriminelle haben es inzwischen vermehrt auf digitale Identitäten abgesehen.khunkornStudio – shutterstock.com Der State of Incident Response Report 2026 von Eye...
Security
AUTOSUR – 487,226 breached accounts
In March 2025, the French vehicle inspection company AUTOSUR suffered a data breach exposing over 10M customer records, though only 487k unique email addresses...
Most popular
Cybercriminals vs financial institutions in 2018: what to expect
ul li {margin-bottom:2.4rem;}
Introduction – key events in 2017
2017 was a year of great changes in the world of cyberthreats facing financial organizations.
Firstly, in 2017...
No One is Safe: the Five Most Popular Social Engineering Attacks Against Your Company’s...
Your Wi-Fi routers and access points all have strong WPA2 passwords, unique SSIDs, the latest firmware updates, and even MAC address filtering. Good job,...
FIN7.5: the infamous cybercrime rig “FIN7” continues its activities
On August 1, 2018, the US Department of Justice announced that it had arrested several individuals suspected of having ties to the FIN7 cybercrime...
Six more vulnerabilities found in n8n automation platform
Six more vulnerabilities have been discovered in the n8n workflow platform used for building LLM-powered agents to connect business processes....


![[Case Study] Securing Your Data In The Cloud](https://www.dataproof.co.za/wp-content/uploads/2019/04/case-study-securing-your-data-in-the-cloud-100x70.jpg)














