vulnerabilities

Data Theft Overtakes Encryption

Data Theft Overtakes Encryption

Cybercriminals continue to refine their tactics, with data theft now dominating ransomware attacks. Meanwhile, business email compromise (BEC) schemes are becoming increasingly significant.

What Comes First? Prioritising Patches

What Comes First? Prioritising Patches

The number of new vulnerabilities—Common Vulnerabilities and Exposures (CVE)—is continually increasing. Even IT professionals find it challenging to prioritise these vulnerabilities.