With 2022 underway, the emphasis is shifting to recovery, growth and investment in the kind of transformational technology that will underpin a bold, secure...
The introduction of a flexible pay-as-you-go monthly subscription payment plan, user-friendly License Management Portal for partners, and multi-layer cybersecurity product stack has made the...
Dubbed MoonBounce, this malicious implant is hidden within a computer’s Unified Extensible Firmware Interface (UEFI) firmware, an essential part of computers, in the SPI...
The world has seen some high-profile incidents where cybercriminals took advantage of the weaknesses of ICT vendors, and used them as attack launch pads...
Cybercriminals can target a variety of industries, from airlines, hospitals, government websites, banks, telecom companies, universities, e-commerce, and even social media giants through different...
Being a strong advocate of 21st-century learning, Globe has lined up a modified training series under its Global Filipino Teachers (GFT) program that covers...
Sophos describes new variants of the miner that include a PowerShell script that attempts to disable malware protection, execute the miner payload and steal...