Threat actors have grown increasingly sophisticated in applying social engineering tactics against their victims, which is key to this oft-underrated cybercriminal scam's success.
Read moreMandiant's ongoing investigation of UNC3886 has uncovered new details of threat actors' TTPs.
Read moreThreat actors have created over 3,000 domains, some as old as two years, to lure in customers to false, name brand websites for personal financial gain.
Read moreMicrosoft Patch Tuesday, June 2023 Edition
June 14 2023Microsoft Corp. today released software updates to fix dozens of security vulnerabilities in its Windows operating systems and other software. This month's relatively light patch load has another added...
Read moreHarness the Power of PKI to Battle Data Breaches
June 14 2023The average cost of a data breach is $4.35 million. Understand the power of public key infrastructure (PKI) and its role in encrypting data and battling breaches.
Read moreVendors and buyers both have the power to make the industry a better place. What's needed is more collaboration, mutual support, and respect.
Read moreGozi threesome from way back in the late 2000s and early 2010s now all charged, convicted and sentenced. The DOJ got there in the end...
Read moreWhile protecting critical infrastructure seems daunting, here are some critical steps the industry can take now to become more cyber resilient and mitigate risks.
Read moreIdentifying the Idaho Killer
June 13 2023The New York Times has a long article on the investigative techniques used to identify the person who stabbed and killed four University of Idaho students.
Pay attention to...
Read moreThe attack highlights growing interest among threat actors to target data from software-as-a-service providers.
Read more
Recent Comments