Google Simplifies 2-Factor Authentication Setup
Google announced on Monday that it’s streamlining the process of activating two-factor authentication (2FA) for users with personal and Workspace accounts.
View Case Studie DetailsHackers Increasingly Abusing Microsoft Graph API for Stealthy Malware Communications
Threat actors are increasingly exploiting the Microsoft Graph API for malicious purposes in an attempt to evade detection. According to a report shared by the Symantec Threat Hunter Team
View Case Studie DetailsCISA Warns of Active Exploitation of Severe GitLab Password Reset Vulnerability
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has included a critical vulnerability affecting GitLab in its Known Exploited Vulnerabilities (KEV) catalog due to ongoing exploitation in the wild.
View Case Studie DetailsUnitedHealth paid ransom to bad actors, says patient data was compromised in Change Healthcare cyberattack
UnitedHealth Group announced on Monday that it made a ransom payment to cyberthreat actors in an attempt to safeguard patient data, following the February cyberattack on its subsidiary Change Healthcare. The company also confirmed that personal information files were compromised during the breach
View Case Studie Details