Select Page

Hackers disrupt Apex Legends esports tournament

Kaspersky Blog – 4.3.24

The esports industry is booming: prize pools for top tournaments have long surpassed $10 million, with peak online viewership exceeding one million. This naturally attracts hackers, who typically either steal game source-code or target individual gamers. Recently, cyberattacks have gone beyond the pale: hackers disrupted a major Apex Legends tournament.

Source: Hackers disrupt Apex Legends esports tournament

1Password cybersecurity report: Balancing information security and productivity in the age of AI | 1Password Blog

1Password Blog – 4.3.24

Here’s the backdrop, and it should be familiar by now: Work has, slowly and then all of a sudden, expanded. No longer confined to the office ecosystem, work happens in coffee shops and at home and at the airport, on company-provided laptops and the shared computer in the living room, on the family iPad and the phones in our pockets.

Source: 1Password cybersecurity report: Balancing information security and productivity in the age of AI | 1Password Blog

“When can we be together – forever?” A deep dive into emotional scamming

Avast Blog – 4.3.24

Today’s most common crime is not burglary, car theft or even shoplifting – it’s online fraud. And this includes pitfalls such as emotional scamming. Not to mention, anyone with an internet connection (in other words, all your customers) is a potential victim. So what do you need to know, and how can you advise your customers, to help keep them safe online from this particular kind of scam?

Source: “When can we be together – forever?” A deep dive into emotional scamming

What is penetration testing? Pen testing explained

NordVPN Blog – 4.3.24

Imagine paying a hacker to break into your servers. Sounds bananas? But if the hacker doesn’t use any of the stolen data and gives you feedback about your system vulnerabilities instead, it doesn’t sound bananas anymore. In fact, one of the best things companies can do to improve their security is to employ these white hat hackers to run penetration tests on their systems

Source: What is penetration testing? Pen testing explained

Revolutionizing threat hunting for MSPs with Acronis Advanced Security + EDR

Acronis Blog – 3.29.24

As cyberthreats grow in complexity and sophistication, the role of threat hunting has become increasingly crucial, and organizations are turning to advanced solutions to fortify their defenses. Endpoint detection and response (EDR) and extended detection and response (XDR) with threat hunting capabilities are at the forefront of this defense evolution.

Source: Revolutionizing threat hunting for MSPs with Acronis Advanced Security + EDR

Social Media Auto Publish Powered By : XYZScripts.com
jQuery(document).ready(function($){ $(‘.et-social-icon .icon’).each(function(){ $(this).find(‘a’).attr(‘target’, ‘blank’); }); });