Clusters of activity associated with the attack group behind last year's supply chain breach reveal novel techniques, researchers say.
Read more5 Ways to Keep Fraudsters at Bay Over the Holidays
December 6 2021Organizations want to focus on customer satisfaction and increased revenues during the holiday shopping season. Here are some smart security and fraud protections to keep in mind.
Read moreSEARCH for Hidden Cyber Threats: 6 Steps to Unleash a Hyper-effective Threat Hunting Team
December 6 2021SEARCH is a carefully-tuned methodology that balances people, process and technology for threat hunters actively searching for, and disrupting, distinctly human threats.
Read moreWhy the C-Suite Doesn’t Need Access to All Corporate Data
December 6 2021If zero trust is to work properly, then it must apply to everyone.
Read moreOne-Third of Black Friday Shoppers Were Bots, Fake Users
December 3 2021Fake traffic observed on Nov. 26 included malicious scrapers, sophisticated botnets, fake accounts, and click farms.
Read moreNSO Group Spyware Used to Breach US State Dept. Phones
December 3 2021At least nine US State Department employee iPhones were targeted with sophisticated spyware developed by the Israeli firm NSO Group.
Read moreIGI Cybersecurity Introduces CISO Team-as-a-Service
December 3 2021Service gives customers access to a CISO-led team of practitioners with a variety of skills and expertise.
Read moreHow Criminals Are Using Synthetic Identities for Fraud
December 3 2021Organizations must improve their cybersecurity protocols to detect fraudulent identities and make sure they're safeguarding their consumers’ personal information.
Read moreLogiq.ai Tackles Observability Problem With LogFlow
December 3 2021LogFlow addresses data risks associated with machine data pipelines.
Read more
Recent Comments