Vulnerable people are lured by Facebook ads promising high-paying jobs, but instead they're held captive and put to work in Cambodia running cyber scams.
Read moreVitali Kremez Found Dead After Apparent Scuba Diving Accident
November 3 2022The renowned security researcher, ethical hacker, and cybersecurity phenom was found Wednesday by the US Coast Guard.
Read moreHow to Narrow the Talent Gap in Cybersecurity
November 3 2022We can bridge that gap by spreading the word about the opportunities, the requirements, and the many tools available to help applicants break into the field.
Read moreSMEs Must Plan for Recovery from Cybersecurity Attacks Amid Shifting Threats, Says MIT Technology Review Insights
November 2 2022A well-crafted — and tested — disaster recovery plan can minimize downtime and is a key component of business continuity plans.
Read moreCybersecurity concerns and education have not mitigated the overuse of the same passwords in 2022.
Read moreThe Art of Calculating the Cost of Risk
November 2 2022Insurance and legislation affect how enterprises balance between protecting against breaches and recovering from them.
Read moreNetskope Threat Research: Next Generation of Phishing Attacks Uses Unexpected Delivery Methods to Steal Data
November 2 2022Report reveals new top sources of fake login page referrals, rise of fake third-party cloud apps used to trick users.
Read moreMusk’s Twitter-Verification Payment Tease Spurs Cyberattackers
November 2 2022A proposed plan to charge users for the platform's coveted blue check mark has, unsurprisingly, inspired attackers to try to dupe people into giving up their credentials.
Read moreGlobal Automotive Cybersecurity Market Report 2022: Expected Mandate for Cybersecurity Protocols to Significantly Boost Sector
November 2 2022As vehicle security expands to cover cyber threats on the vehicle as well as the vehicle's external network, cross-industry collaboration and market opportunities are expected to increase.
Read moreEverything You Need to Know About LockBit
November 2 2022While the ransomware-for-hire group works to create ever more efficient exploits, companies can protect themselves with structured vulnerability management processes. Prioritize threats based on severity and risk.
Read more
Recent Comments