Cybercriminals could trick scientists into creating hazardous substances

The research paper demonstrates a potential attack scenario that makes use of this combination of weaknesses and allows a remote actor to dupe the target into creating a dangerous substance without any physical interaction needed from the attacker’s side.

Mimecast gets recognized by Gartner for Enterprise Information Archiving

Mimecast prioritizes innovation and anticipates that it will release additional features for instant message support for Microsoft Teams, predictive coding for e-discovery and data protection for OneDrive over the next several months.

Exclusive Networks inks distribution agreement with Vectra in Middle East

Powered by AI, the Cognito® platform from Vectra® automatically detects and prioritises cyberattacker behaviours in real time while empowering threat hunters to perform conclusive incident investigations.

Study reveals 94% organizations experienced a cyberattack in past 12 months

Only four out of ten security leaders say they can answer the fundamental question, “How secure, or at risk, are we?” with a high level of confidence, despite the prevalence of business-impacting cyberattacks.

Survive a cyberattack with these essential steps

Automated response plays a large part in managing the resources and time available for your IT security. Often, the danger from an adverse event can be managed well enough by a single IT administrator wielding the basic tools of the trade.