Researchers Uncover 6-Year Cyber Espionage Campaign Targeting Iranian Dissidents

Capping off a busy week of charges and sanctions against Iranian hackers, a new research offers insight into what’s a six-year-long ongoing surveillance campaign targeting Iranian expats and dissidents with an intention to pilfer sensitive information. The threat actor, suspected to be of Iranian origin, is said to have orchestrated the campaign with at least two…

Critical Flaws Discovered in Popular Industrial Remote Access Systems

Cybersecurity researchers have found critical security flaws in two popular industrial remote access systems that can be exploited to ban access to industrial production floors, hack into company networks, tamper with data, and even steal sensitive business secrets. The flaws, discovered by Tel Aviv-based OTORIO, were identified in B&R Automation’s SiteManager and GateManager, and MB Connect Line’s…

Increased Adoption of Lead-to-Account Matching and Routing Leads to New G2 Category

It’s no secret that it can be quite difficult to manage all inbound leads into an organization. When a lead form from a survey or marketing event is completed, the lead often populates in the CRM software or other related sales account management software. While this lead populates in a CRM, sales and marketing departments spend lots of time to find the correct account that matches with the lead, as well as the salesperson who should be responsible for reaching out to that lead.