WELCOME TO The Information security REPORT
Newsletter | Member Login | Signup
Home > Companies > Viral Security Group
Feature market insights and perspectives from top C-Level executives, elite technology influencers and thought leaders from your company here. This signature initiative has garnered immense support...
Conference
DCMS | May 11, 2020
Almost every month there is a new report detailing how firms are increasing their cybersecurity budgets, or buying the latest tech to help defeat hackers. The typical way that companies have looked to improve their cyber capabilities is by investing in the...
Platform Security
CrowdStrike | April 08, 2022
CrowdStrike , a leader in cloud-delivered protection of endpoints, cloud workloads, identity and data, and Mandiant , announced a strategic partnership that will help joint customers investigate, remediate and defend against increasingly sophisticated cybersecurity events that plague organizations globally. As part of the collaboration, Mandiant will utilize the CrowdStrike Falcon® platform and subscription offerings for its incident response (IR) services and proactive consulting engagement...
Search Engine Journal | June 29, 2020
Hackers are using Google Analytics to steal credit cards, passwords, IP addresses... basically everything shared with a hacked site.An investigation by Kaspersky Lab has uncovered a new hacking technique that uses Google Analytics to steal credit card numbers, user agents, IP addresses, passwords… basically everything.This isn’t an exploit in Google Analytics itself.Hackers are exploiting the trusted status given to Google Analytics by all browsers in order to stea...
Cyware | February 09, 2020
A zero-day vulnerability is a weakness within a computer network or software program that is unknown to its developers. The term ‘zero’ indicates the same-day window in which exploits often occur. Zero-day attacks come without warning. Such attacks can pose a high risk for a company or business if appropriate actions are not taken at the right time. It can even lead to loss of millions of dollars and put untold volumes of private info at risk. A zero-day vulnerability is a weakness w...
Software Security
Article
infographic
InfoSec Project Management
Whitepaper
Keep me plugged in with the best
Join thousands of your peers and receive our weekly newsletter with the latest news, industry events, customer insights, and market intelligence.
Welcome back!
Put your news, events, company, and promotional content in front of thousands of your peers and potential customers.
Not a member yet? Not a problem, Sign Up
Sign up
Sign up to contribute and publish your news, events, brand, and content with the community for FREE