CMG

BLOG / NEWS

New Mockingjay Process Injection Technique Evades EDR Detection

"Mockingjay" is a new process injection technique that bypasses EDR and security products, enabling the undetectable execution of malicious code….
Read More

Use of Multifactor Authentication (MFA) Nearly Doubles

It's no surprise that multifactor authentication (MFA) is becoming increasingly important for organizations of all sizes to protect against cybersecurity…
Read More

How AI is Shaping the Future of Workforce Development

AI is not only transforming the types of jobs that are in demand, but it is also changing how work…
Read More

Hyperautomation is transforming industries across the globe.

The combination of artificial intelligence (AI), machine learning (ML), and robotic process automation (RPA) technologies can do complex tasks that…
Read More

Zip Domains Are Being Abused Again To Trick Victims Into a Phishing Scam

A new method of phishing has been discovered that abuses .zip internet domains. The scam makes the victim think they…
Read More

Ransomware Threats are Growing, and Targeting Microsoft Devices More and More

With the rise of ransomware, organizations need help to keep up with all the emerging threats. If you haven't already,…
Read More

New Cactus Ransomware Encrypts Itself to Evade Antivirus

A new ransomware variant called Cactus encrypts itself to avoid detection by antivirus software. This clever tactic enables the attackers…
Read More

Hackers Target Vulnerable Veeam Backup Servers Exposed Online

With the recent spike in ransomware attacks, businesses have been scrambling to protect their infrastructure. Unfortunately, some companies may be…
Read More

Navigating the Challenges of Multi-Cloud and Multi-Geo Cybersecurity for Business Leaders

Cyber attacks are on the rise, and many businesses have adopted cloud computing to stay competitive. But challenges with multi-cloud…
Read More

What Automation Means For Cybersecurity—And Your Business

With more devices, services, and workflows coming together in hybrid environments and the cloud, the attack surface is growing. Cybersecurity…
Read More
1 2 3 4 5 6 7