November 2022

Scott Olson joins Outseer as CMO
In his new role as CMO, Scott Olson will spearhead Outseer’s mission to liberate the world from transactional fraud and build on the company’s heritage of innovation. …

Nozomi OnePass offers a single subscription to all Nozomi Networks solutions
Nozomi Networks introduced OnePass, a completely integrated hardware and software as a service model for OT and IoT security. Customers can now purchase and deploy solutions …

NortonLifeLock changes its name to Gen, powering the next generation of digital life
NortonLifeLock unveiled its new company name, Gen Digital, following the completed merger of NortonLifeLock and Avast. Gen unites trusted names in Cyber Safety – Norton, …

Microsoft fixes many zero-days under attack
November 2022 Patch Tuesday is here, with fixes for many vulnerabilities actively exploited in the wild, including CVE-2022-41091, a Windows Mark of the Web bypass flaw, and …

Malicious droppers on Google Play deliver banking malware to victims
Android users are often advised to get mobile apps from Google Play, the company’s official app marketplace, to minimize the possibility of downloading malware. After …

VMware SD-WAN Client reduces organizational risks against breaches
In order to stay competitive, enterprises are transforming their applications, adopting multi-cloud and SaaS, and enabling users to access these applications from the office, …

Auto retailers are falling victim to sophisticated phishing
Cybercriminals are getting craftier as auto retailers continue to fall victim to well-disguised cyberattacks. According to the second annual dealership cybersecurity study by …

The security dilemma of data sprawl
As hybrid work becomes the norm in business, so does data sprawl. Data sprawl refers to the spread of company information to various places, which often comes from dispersed …

Exposing Emotet and its cybercriminal supply chain
Emotet, one of the most evasive and destructive malware delivery systems, caused substantial damage during its initial reign. After a coordinated takedown by authorities in …

Active security budget evaluation plugs holes in your security stack
Every successful attack has breached the security stack. Once the foundation of good cybersecurity, firewalls, and other security products are not enough to block all of the …

How geopolitical turmoil changed the cybersecurity threat landscape
ENISA, EU’s Agency for Cybersecurity, released its annual Threat Landscape report, covering the period from July 2021 up to July 2022. Cybersecurity threat landscape in …

How micro-VMs can protect your most vulnerable endpoints
Since the pandemic began, cyberattacks have increased by 400%, and many home Wi-Fi networks are unable to withstand the assault. In fact, over 80% of home-office routers were …
Featured news
Resources
Don't miss
- Attackers are exploiting critical SAP S/4HANA vulnerability (CVE-2025-42957)
- Stealthy attack serves poisoned web pages only to AI agents
- September 2025 Patch Tuesday forecast: The CVE matrix
- Google fixes actively exploited Android vulnerabilities (CVE-2025-48543, CVE-2025-38352)
- CyberFlex: Flexible Pen testing as a Service with EASM