article thumbnail

Pitch, a platform for making and sharing presentations, raises $85M on a $600M valuation

TechCrunch

” The idea is to make it less like spyware, and more like the kind of analytics one might have on YouTube for videos there. . “As a German business, we have a special relationship with data privacy in the greatest sense,” he said. “We care deeply about making sure we approach features in a privacy-first way.”

Spyware 246
article thumbnail

9 Types of Phishing and Ransomware Attacks—And How to Identify Them

Ivanti

Ransomware is also proliferated using trojans, spam email with malicious attachments, fake software update tools, third-party software app stores and distribution sources that push apps and tools that contain malware, spyware, or exploit kits. Watch the on-demand webinar: A Multi-Layered Approach to Anti-Phishing. Learn more.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Cybersecurity Snapshot: NIST’s Cybersecurity Framework Gets Major Update, as Advisories on APT29 and ALPHV Blackcat Get Rolled Out

Tenable

Watch the on-demand webinar “ Securing Identities Across Your Entire Attack Surface.” Check out what they said about their biggest challenges, their approach and more. (64 Check out what they said about their biggest challenges, their approach and more. (64 updates guidance on ALPHV Blackcat, warns healthcare orgs The U.S.

article thumbnail

Cybersecurity Snapshot: Tips for cloud configs, MSP vetting, CISO board presentations

Tenable

Cloud Security Roundtable: Scaling Cloud Adoption without Sacrificing Security Standards ” (Tenable webinar). Cloud Security Roundtable: Scaling Cloud Adoption without Sacrificing Security Standards ” (Tenable webinar). For more information, you can request a copy of the full report or watch this on-demand webinar. Kinda, sorta.

Cloud 52
article thumbnail

Cybersecurity Snapshot: 6 Things That Matter Right Now

Tenable

At a recent Tenable webinar , we took the opportunity to poll participants about the size of their tool stacks. TeamSpy, spyware that uses remote access tool TeamViewer and malware to steal information. Here’s what we found. (99 99 respondents polled by Tenable in Sept. Cybersecurity: Best-of-Breed Approach or Single-Vendor Platform?

IoT 54
article thumbnail

Cybersecurity Snapshot: Beware of Mobile Spyware Attacks, Cyber Agencies Warn, While Corporate Boards Get Cyber Governance Guidance

Tenable

Check out why a global geopolitical spyware campaign could ensnare mobile users outside of its target groups. Also, find out what webinar attendees told Tenable about using port scanning and service discovery to detect attack paths. Plus, the U.K.s cyber agency offers cyber governance resources to boards of directors. And much more!

Spyware 74