According to a report from NopSec, cyber attackers are increasingly using Twitter to disseminate proof-of-concept exploits. The report also found that cyber attackers are more focused on the outcomes of the attacks rather than the ease of exploiting vulnerabilities. Exploit techniques are also becoming more sophisticated, with 98% of tracked exploit kits coming from Microsoft, Adobe Flash and Oracle Java.
CloudMile and Horangi Cyber Security partner to promote cybersecurity solutions for Malaysian businesses, ETCIO SEA
AI and cloud company, CloudMile, has partnered with Singapore’s Horangi Cyber Security to bring Horangi’s secure enterprise solutions to Malaysia, specifically in financial and public