Security & Performance

How Are Advancements in AI Driving Data Center Innovation?
Security & Performance How Are Advancements in AI Driving Data Center Innovation?

The rapid expansion of artificial intelligence (AI) has driven significant advancements and innovations in data center design and testing, pushing the boundaries of what these infrastructures can achieve. As the necessity for improved AI processing capacity surges, data centers must adapt to the

DISA's Thunderdome Achieves Advanced Zero-Trust Compliance
Security & Performance DISA's Thunderdome Achieves Advanced Zero-Trust Compliance

The Defense Information Systems Agency's (DISA) Thunderdome program has remarkably met the stringent advanced zero-trust standards set by the Pentagon. This achievement highlights a pivotal milestone in implementing IT and cybersecurity technologies across various Defense Department agencies.

UK Advances Cyber Resilience with New Security and Resilience Bill
Security & Performance UK Advances Cyber Resilience with New Security and Resilience Bill

The United Kingdom is making strides in enhancing its cyber resilience with the introduction of a new Cyber Security and Resilience Bill. This significant legislative measure aims to bolster compliance requirements for approximately 1,000 organizations across the UK, expanding on the EU’s NIS2

What Led to the 303% Surge in Crypto Theft in Q1 2025?
Security & Performance What Led to the 303% Surge in Crypto Theft in Q1 2025?

The first quarter of 2025 witnessed an extraordinary wave of crypto theft, with over $1.67 billion in digital assets stolen, representing a staggering 303% increase from the previous quarter. This alarming surge was documented in CertiK's Hack3d: Q1 2025 Report, which detailed 197 security

Morphing Meerkat: Advanced Phishing Platform Targets 114 Email Brands
Security & Performance Morphing Meerkat: Advanced Phishing Platform Targets 114 Email Brands

In an era where cyber threats continue to evolve at an alarming rate, a sophisticated Phishing-as-a-Service (PhaaS) platform named ‘Morphing Meerkat’ has been identified by Infoblox Threat Intel. This platform has demonstrated its capability to spoof over 100 brands, effectively gathering user

How Does Morphing Meerkat's PhaaS Exploit DNS MX Records for Phishing?
Security & Performance How Does Morphing Meerkat's PhaaS Exploit DNS MX Records for Phishing?

In the evolving landscape of cybersecurity threats, Morphing Meerkat has emerged as a formidable adversary. This clandestine threat actor operates a sophisticated phishing-as-a-service (PhaaS) platform that ingeniously exploits DNS mail exchange (MX) records. Morphing Meerkat’s platforms generate

Loading

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later