Apps on your iPhone must come from the App Store. Except when they don't... we explain what to look out for.
Read moreMirai Common Attack Methods Remain Consistent, Effective
August 17 2023While relatively unchanged, the notorious IoT botnet still continues to drive DDoS.
Read moreThreats and opportunities are abound for the UAE and Gulf states, so can they deal with being a cybersecurity stronghold?
Read moreBoards Don’t Want Security Promises — They Want Action
August 16 2023CISOs must demonstrate that security processes and updates reduce risk in measurable ways. Put emphasis on action, get the basics right, and improve processes.
Read moreIran and the Rise of Cyber-Enabled Influence Operations
August 16 2023Iranian threat actors are combining offensive network ops with messaging and amplification to manipulate targets' perceptions and behavior. Here are three examples.
Read moreQR Code Phishing Campaign Targets Top US Energy Company
August 16 2023Attackers sent more than 1,000 emails with 2FA, MFA, and other security-related lures aimed at stealing Microsoft credentials.
Read moreUK Electoral Commission Hacked
August 16 2023The UK Electoral Commission discovered last year that it was hacked the year before. That’s fourteen months between the hack and the discovery. It doesn’t know who was behind...
Read moreMandiant's IoC Scanner will help enterprises collect indicators of compromise on affected Citrix NetScaler products.
Read more3 Major Email Security Standards Falling Down on the Job
August 16 2023Nearly 90% of malicious emails manage to get past SPF, DKIM, or DMARC, since threat actors are apparently using the same filters as legitimate users.
Read more
Recent Comments