Netskope: Attackers Double Down on Social Engineering Techniques and Malicious Functionalities
May 5 2023Researchers find attackers are successfully evading detection by blending in with normal network traffic via HTTP and HTTPS.
Read moreResearchers find attackers are successfully evading detection by blending in with normal network traffic via HTTP and HTTPS.
Read moreGoogle's new program aims to offer accessible training to fill 750K open cybersecurity jobs with diverse array of talent.
Read moreSharing information is critical to help organizations protect data and systems. To be even more effective, collaboration should be inclusive — vendors, researchers, and private companies large and small.
Read moreScammers are leveraging the popularity of ChatGPT in phishing attacks. Here's a look at research on these newly registered domains and tactics.
Read moreCybersecurity is a hotbed of startup activity, and with good reason. Startups typically look for an IPO or acquisition, but right now IPOs are off the table.
Read moreThree vulnerabilities in the platform's API Management Service could allow access sensitive data, mount further attacks, and even hijack developer portals.
Read moreThree vulnerabilities in the platform's API Management Service could allow access sensitive data, mount further attacks, and even hijack developer portals.
Read moreIn part one of this three-part series, Microsoft details how cybercriminals innovate and evade detection to make money or sow destruction.
Read moreThe debate over whether ChatGPT and other generative AI tools will benefit defenders or further embolden attackers may be ongoing, but companies are going forward with new tools.
Read more
Recent Comments