Securing the Future of HPC: Implementing Zero Trust and Strengthening Network Security

Written by CSA’s High Performance Computing Working Group. High-Performance Computing (HPC) systems are pivotal in driving scientific research and innovation, offering computational power that exceeds conventional computing architectures. However, the complexity and scale of these systems introduces unique security challenges that must be addressed to protect sensitive data and maintain research integrity. As HPC environments […]

Vivaldi vs Opera – Which Chromium Browser is Best in 2024?

I decided to put Vivaldi vs Opera head-to-head, to see which of the two is the best in 2024. According to the browser usage statistics, both options are gaining popularity, and for good reason. Read on as I explore their top features, compare performance, ease of use, and more. Vivaldi vs Opera – Features As […]

Webinar: Experience the Power of a Must-Have All-in-One Cybersecurity Platform

Let’s be honest. The world of cybersecurity feels like a constant war zone. You’re bombarded by threats, scrambling to keep up with patches, and drowning in an endless flood of alerts. It’s exhausting, isn’t it? But what if there was a better way? Imagine having every essential cybersecurity tool at your fingertips, all within a […]

Focus on What Matters Most: Exposure Management and Your Attack Surface

Read the full article for key points from Intruder’s VP of Product, Andy Hornegold’s recent talk on exposure management. If you’d like to hear Andy’s insights first-hand, watch Intruder’s on-demand webinar. To learn more about reducing your attack surface, reach out to their team today.  Attack surface management vs exposure management Attack surface management (ASM) is […]

A new app called Google Essentials to arrive on your Windows PCs

Google has launched Google Essentials, a new desktop app designed to help users easily discover and install popular Google services on Windows PCs. Or, in other words, the desktop app bundles several Google services like Messages, Photos, and Play Games, and provides links to download others such as Google Drive and Google Sheets. Initially available […]

New Qilin Ransomware Attack Uses VPN Credentials, Steals Chrome Data

The threat actors behind a recently observed Qilin ransomware attack have stolen credentials stored in Google Chrome browsers on a small set of compromised endpoints. The use of credential harvesting in connection with a ransomware infection marks an unusual twist, and one that could have cascading consequences, cybersecurity firm Sophos said in a Thursday report. […]

New macOS Malware “Cthulhu Stealer” Targets Apple Users’ Data

Cybersecurity researchers have uncovered a new information stealer that’s designed to target Apple macOS hosts and harvest a wide range of information, underscoring how threat actors are increasingly setting their sights on the operating system. Dubbed Cthulhu Stealer, the malware has been available under a malware-as-a-service (MaaS) model for $500 a month from late 2023. […]

This site uses cookies to offer you a better browsing experience. By browsing this website, you agree to our use of cookies. Click More Info to view Privacy Policy.