The layoffs come after a hiring spree during the pandemic, and follow a wave of job cuts by other major tech companies.
AIP goes one step further from API security and provides telemetry collection and intrusion detection for cloud-native workloads.
Gartner projects sales for low-code development technologies to grow by 19 per cent over the next four years to reach $44.5 billion by 2026.
Layoffs are expected in multiple locations and departments including IT, and will affect all levels of employees, according to sources.
Hewlett Packard Enterprise is in talks to acquire cloud computing firm Nutanix, Bloomberg reported, quoting sources familiar with the matter.
A database housing as many as 487 million WhatsApp users’ mobile numbers has been put up for sale on a hacking community forum.
In the first seven months of this year, threat actors stole over 50 million passwords, two billion cookie files, details of 103,150 bank cards, and data from 113,204 crypto wallets.
DDoS IP Protection is designed to provide enterprise-grade distributed denial of service protection at a price that's attractive to SMBs.
State-sponsored threat actors have targeted 128 government organisations in 42 countries that support Ukraine, as ransomware and DDoS rank as top attacks.
Attackers built a fake online community and used a malicious VPN app to steal credentials and other user data.
Some of the biggest challenges faced in securing industrial control systems involve integrating legacy and aging operational technology with modern IT systems.
The vast majority of organisations lack confidence in securing their data in cloud, while many companies acknowledge they lack sufficient security.
Malwarebytes MDR works by pairing EDR technology with a dedicated team of security analysts, providing both automated and human lines of defence.
While currently the campaign is only involved in cryptojacking, it exploits DLL side-loading, which can be used to deploy spyware or ransomware.
A new malware campaign uses the recently discovered Quantum Builder and sophisticated tactics to deliver malicious payload.