3 min read - Researchers spotted a new campaign in which malicious actors leveraged trojanized versions of popular hacking tools to spread njRat. Read on to learn what else happened last week in security news.
4 min read - Many organizations still struggle with application and web security due to numerous persistent challenges, most of which relate to lack of oversight, poor planning and human error.
2 min read - Threat-aware identity and access management tools have the advanced capabilities necessary to protect an organization's business-critical data.
Analysis and insights from hundreds of the brightest minds in the cybersecurity industry to help you prove compliance, grow business and stop threats.