Cybercriminals are abusing Twitter via tech support scams, command-and-control (C&C) operations and data exfiltration, with criminals found using fake Twitter accounts to spoof those of legitimate vendors for credible tech support scams.

Published in Security

Process and software inefficiencies are having a major impact in slowing down an organisation’s ability to detect and respond to cyber threats, according to a new research study released by security intelligence company LogRhythm.

Published in Security

Real-time analytics vendor ExtraHop has announced its machine-learning service, Addy, is now available in Australia.

Published in Enterprise Solutions
Page 1 of 2

VENDOR NEWS & EVENTS

REVIEWS

Recent Comments