Category

Uncategorized
Once again, Uber has found itself in the midst of a data breach controversy, as reports emerge of the ride-hailing giant’s driver information being stolen from the servers of a law firm. The law firm in question has not yet been named, but it is believed that the cyberattack took place in May of 2022....
Read More
Compliance services are emerging as one of the hottest areas of cybersecurity. While compliance used to be mainly the province of large enterprises, times have changed, and it is now a day-to-day concern for a growing number of small and medium businesses. Even when these organizations are not regulated, SMEs often aim to follow compliance...
Read More
A financially motivated threat actor tracked as Blind Eagle has resurfaced with a refined toolset and an elaborate infection chain as part of its attacks targeting organizations in Colombia and Ecuador. Check Point’s latest research offers new insights into the Spanish-speaking group’s tactics and techniques, including the use of sophisticated tools and government-themed lures to activate the killchain. Also...
Read More