There’s no doubt that Microsoft 365 is widely used among companies of all sorts of sizes. This...
Presenters: Paul Gower, Director Sales Engineering Sergio Lozano Alvarez, Product Marketing Manager...
Discover the regreSSHion (CVE-2024-6387) OpenSSH vulnerability. Learn about its impact, affected...
Discover the threat of OS Credential Dumping (T1003), its impact, and Logpoint’s strategies to...
Explore Forest Blizzard’s (APT28) latest tactics and attacks on Polish institutions. Learn about...
Kapeka backdoor targets Eastern Europe. Learn about Kapeka's functionalities, Sandstorm connection,...
DLL Flaw Injects Malware! Hackers target KeyScrambler with DLL side-loading. Learn to detect &...
Usability, performance and log configuration - these are some of the improvement areas in this...
To protect their assets, businesses need to know about the security threats out there. This article...
Discover XZ Utils, renowned for high compression & data integrity. Learn about recent CVE-2024-3094...
Don't be fooled by the name! Raspberry Robin malware targets businesses, uses Discord & exploits...
Uncover the inner workings of DarkGate malware. Learn how this RAT & loader steals data & deploys...