Welcome back to IT Pro Tuesday! In the latest Security Swarm Podcast: “Why Confidential Computing Matters,” we provide a comprehensive overview of confidential computing—what it is, why it’s important, and how it’s being implemented in cloud platforms like...
The FBI is warning cryptocurrency holders to keep watch for scams impersonating exchange employees asking to provide login information. The agency’s public service alert, issued Aug. 1, clearly details the ruse scammers typically use to obtain access to crypto wallets...
Improvements UI improvements have been made to the “To Do” module, specifically when fixing or approving violations. Fixes have been applied to the operation history report. The violation detection mechanism has been enhanced. General fixes and...
As law enforcement incidents increase, a cunning strain of exploitation has surfaced and started to grow roots in the cyber landscape. It preys on individuals' goodwill through fraudulent police fundraising calls. Threat actors weaponize people’s good nature,...
German authorities have summoned the Chinese ambassador following the discovery that a 2021 cyberattack on a government institution was perpetrated by Chinese hackers, with espionage as the primary goal. We're used to hearing about hackers going after critical...
Threatening someone with the release of images and videos captured from an infected device has been a common criminal tactic for years. You would think there's no chance someone actually believes it. The fact that we're still dealing with this ridiculous claim from...