A pair of Microsoft bugs allow cyberattackers to bypass native Windows Internet download security, says former CERT CC researcher who discovered the flaws.
Read moreLinkedIn Phishing Spoof Bypasses Google Workspace Security
October 25 2022A credential-stealing attack that spoofed LinkedIn and targeted a national travel organization skates past DMARC and other email protections.
Read moreThreat Groups Repurpose Banking Trojans into Backdoors
October 25 2022Ursnif, a one-time banking Trojan also known as Gozi, becomes the latest codebase to be repurposed as a more general backdoor, as malware developers trend toward modularity.
Read moreEquifax’s Lessons Are Still Relevant, 5 Years Later
October 25 2022Cybersecurity pros discuss a trio of lessons from the Equifax hack and how to prevent similar attacks in the enterprise.
Read moreEquifax’s Lessons Are Still Relevant, 5 Years Later
October 25 2022Cybersecurity pros discuss a trio of lessons from the Equifax hack and how to prevent similar attacks in the enterprise.
Read moreHR Departments Play a Key Role in Cybersecurity
October 25 2022A more secure organization starts with stronger alignment between HR and the IT operation.
Read moreSpyderbat Raises Series A to Deliver Runtime Security Throughout Cloud Native Software Development Environments
October 25 2022Led by NTTVC, the funding enables further development of Cloud Native Intrusion Prevention from the team that invented Network Intrusion Prevention Systems.
Read moreMSP Market Opportunity Report Finds Cybersecurity as Primary Growth Driver as SMBs Lack Resources to Develop Security Program In-House
October 25 2022New report shows 75% of MSPs will invest in security threat intelligence services in the next 12 months to help businesses combat increased threats.
Read more
Recent Comments