The Evolution of Business Email Compromise
November 30 2022The simplicity and profitability of these attacks continue to appeal to threat actors a decade later.
Read moreThe simplicity and profitability of these attacks continue to appeal to threat actors a decade later.
Read moreCurrent authentication methods are based on the bearer model, but lack of visibility into the entities leveraging API secrets has made this untenable.
Read moreRed Hat has issued patches for a bug in an open source Java virtual machine software that opens the door to drive-by localhost attacks. Patch now, as it's easy...
Read moreThe quarterly report, made possible by its Dynamic Defense™ service, demonstrates significant progress in mitigating domain abuse among its top-level domains (TLDs).
Read moreNew functionality further reduces the risk of lateral movement.
Read moreThe NSS Labs archive, available with free registration, consists of over 800 test reports, analyst briefs, and research published by NSS Labs from 2013 — 2020.
Read moreFacebook—Meta—was just fined $276 million (USD) for a data leak that included full names, birth dates, phone numbers, and location. Meta’s total fine by the Data Protection Commission is over...
Read moreCloud native application protection platforms can apply machine learning algorithms on cloud data to identify accounts with abnormal permissions and uncover potential threats.
Read moreThe new Microsoft Defender for Endpoint capabilities include built-in protection and scanning network traffic for malicious activity.
Read moreOrganizations must be prepared to root out bad actors by any means possible, even if it means setting traps and stringing lures.
Read more
Recent Comments