Results from phishing simulation campaigns highlight the five most effective types of phishing email.
Read moreEcuador’s Attempt to Resettle Edward Snowden
June 29 2022Someone hacked the Ecuadorian embassy in Moscow and found a document related to Ecuador’s 2013 efforts to bring Edward Snowden there. If you remember, Snowden was traveling from Hong...
Read moreThe clever, interactive phishing campaign is a sign of increasingly complex social-engineering attacks, researchers warn.
Read moreThe clever, interactive phishing campaign is a sign of increasingly complex social-engineering attacks, researchers warn.
Read moreGoogle Analytics has been found to be in violation of GDPR privacy laws by Italy — the third country to ban it.
Read moreResearchers this week said they had observed criminals using a new and improved version of the prolific malware, barely three months after its authors announced they were quitting.
Read moreThe Link Between AWM Proxy & the Glupteba Botnet
June 28 2022On December 7, 2021, Google announced it had sued two Russian men allegedly responsible for operating the Glupteba botnet, a global malware menace that has infected millions of computers...
Read moreThe previously unknown state-sponsored group is compromising industrial targets with the ShadowPad malware before burrowing deeper into networks.
Read moreAtlassian Confluence Exploits Peak at 100K Daily
June 28 2022Swarms of breach attempts against the Atlassian Confluence vulnerability are likely to continue for years, researchers say, averaging 20,000 attempts daily as of this week.
Read moreCreating temporary keys that are not stored in central repositories and time out automatically could improve security for even small businesses.
Read more
Recent Comments