5 Ways to Survive Scam Season — or Rather, Tax Season
February 7 2023Security pros need to look beyond user education to find and disarm fraudulent actors.
Read moreSecurity pros need to look beyond user education to find and disarm fraudulent actors.
Read moreCriminals using Google search ads to deliver malware isn’t new, but Ars Technica declared that the problem has become much worse recently.
The surge is coming from numerous malware...
Read more
New tech often requires new thinking — but that's harder to install.
Read moreSecurity teams can use a blocklist containing tens of thousands of proxy IP addresses used by the pro-Russian hacktivist group to defend their organizations from DDoS attacks.
Read moreCryptocurrency drainers are the latest hot ticket being used in a string of lucrative cyberattacks aimed at virtual currency investors.
Read moreThe fresh "ESXiArgs" malware is exploiting a 2-year-old RCE security vulnerability (tracked as CVE-2021-21974), resulting in thousands of unpatched servers falling prey to the campaign.
Read moreLook for recent trends in attacks, strategies, and vulnerabilities to continue gaining steam throughout 2023.
Read moreDespite growing awareness, organizations remain plagued with unpatched vulnerabilities and weaknesses in credential policies.
Read more
Recent Comments