AuditBoard

auditboard.com

AuditBoard
AuditBoard transforms how audit, risk, and compliance professionals manage today’s dynamic risk landscape with a modern, connected platform that engages the front lines, surfaces the risks that matter, and drives better strategic decision-making.

C-Suite On Deck

Responsive image

Feature market insights and perspectives from top C-Level executives, elite technology influencers and thought leaders from your company here. This signature initiative has garnered immense support...

Contact Us

Events

Related News

OVER 18 MILLION COVID-19 MALWARE AND PHISHING EMAILS BLOCKED BY GOOGLE

Google | April 27, 2020

news image

Google says it has blocked 18 million daily malware and phishing emails related to COVID-19 over the past week. Majority of malware and phishing emails involve impersonation. Read More

DATA BREACH REPORT: POPULAR DIGITAL WALLET APP KEY RING EXPOSES 14 MILLION USERS

securitymagazine | April 03, 2020

news image

Led by Noam Rotem and Ran Locar, vpnMentor’s research team of ethical hackers, recently discovered a data leak by the popular app Key Ring, that compromised the privacy and security of their 14 million users. Key Ring allows users to upload scans and photos of membership and loyalty cards onto a digital folder on one’s phone. However, many users also use it to store copies of IDs, driver licenses, credit cards, and more. A misconfigured Amazon Web Services (AWS) S3 bucket owned by th...

Read More

Data Security, Platform Security, Software Security

VARONIS INTRODUCES AUTOMATED POSTURE MANAGEMENT TO FIX CLOUD SECURITY RISKS

Varonis | January 27, 2023

news image

On January 26, 2023, Varonis Systems, Inc., a leader in data security and analytics, announced the availability of automated posture management to assist clients in resolving security and compliance gaps spanning their SaaS and IaaS systems. Varonis continuously scans, identifies, and ranks cloud security threats, providing CISOs and compliance officers with real-time insight into their data security posture. With this new automation option, users can fix misconfigurations in ap...

Read More

AZORULT CAMPAIGN ADOPTS NOVEL TRIPLE-ENCRYPTION TECHNIQUE

thraetpost | February 03, 2020

news image

A recent wave of AZORult-laced spam caught the attention of researchers who warn that malicious attachments associated with the campaign are using a novel obfuscation technique, in an attempt to slip past spam gateways and avoid client-side antivirus detection. What makes this campaign unique is the use by threat actors of a triple-encrypted AZORult downloader being pushed by the otherwise non-descript malspam assault. AZORult is remote access trojan popular on Russian forums and most recently s...

Read More
news image

OVER 18 MILLION COVID-19 MALWARE AND PHISHING EMAILS BLOCKED BY GOOGLE

Google | April 27, 2020

Google says it has blocked 18 million daily malware and phishing emails related to COVID-19 over the past week. Majority of malware and phishing emails involve impersonation. Read More

news image

DATA BREACH REPORT: POPULAR DIGITAL WALLET APP KEY RING EXPOSES 14 MILLION USERS

securitymagazine | April 03, 2020

Led by Noam Rotem and Ran Locar, vpnMentor’s research team of ethical hackers, recently discovered a data leak by the popular app Key Ring, that compromised the privacy and security of their 14 million users. Key Ring allows users to upload scans and photos of membership and loyalty cards onto a digital folder on one’s phone. However, many users also use it to store copies of IDs, driver licenses, credit cards, and more. A misconfigured Amazon Web Services (AWS) S3 bucket owned by th...

Read More
news image

Data Security, Platform Security, Software Security

VARONIS INTRODUCES AUTOMATED POSTURE MANAGEMENT TO FIX CLOUD SECURITY RISKS

Varonis | January 27, 2023

On January 26, 2023, Varonis Systems, Inc., a leader in data security and analytics, announced the availability of automated posture management to assist clients in resolving security and compliance gaps spanning their SaaS and IaaS systems. Varonis continuously scans, identifies, and ranks cloud security threats, providing CISOs and compliance officers with real-time insight into their data security posture. With this new automation option, users can fix misconfigurations in ap...

Read More
news image

AZORULT CAMPAIGN ADOPTS NOVEL TRIPLE-ENCRYPTION TECHNIQUE

thraetpost | February 03, 2020

A recent wave of AZORult-laced spam caught the attention of researchers who warn that malicious attachments associated with the campaign are using a novel obfuscation technique, in an attempt to slip past spam gateways and avoid client-side antivirus detection. What makes this campaign unique is the use by threat actors of a triple-encrypted AZORult downloader being pushed by the otherwise non-descript malspam assault. AZORult is remote access trojan popular on Russian forums and most recently s...

Read More

Resources

resource image

InfoSec Project Management

Protecting Public Water Systems From Cyberattacks

Whitepaper

Events

C-Suite On Deck

Responsive image

Feature market insights and perspectives from top C-Level executives, elite technology influencers and thought leaders from your company here. This signature initiative has garnered immense support...

Contact Us