In the always-changing world of cyberattacks, preparedness is key.
Read moreFirefox squashes a bug that helped phishers, and brings its own helping hand to Microsoft's "Follina" saga.
Read moreWhat’s Your AppSec Personality?
June 29 2022It's time to decide which role to play to best serve your organization's security needs: an auditor, a lawyer, or a developer.
Read moreExternal attacks focused on vulnerabilities are still the most common ways that companies are successfully attacked, according to incident data.
Read moreEmbrace cyber-risk modeling and ask security teams to pinpoint the risks that matter and prioritize remediation efforts.
Read more5 Surprising Cyberattacks AI Stopped This Year
June 29 2022See how these novel, sophisticated, or creative threats used techniques such as living off the land to evade detection from traditional defensive measures — but were busted by AI.
Read moreResults from phishing simulation campaigns highlight the five most effective types of phishing email.
Read moreEcuador’s Attempt to Resettle Edward Snowden
June 29 2022Someone hacked the Ecuadorian embassy in Moscow and found a document related to Ecuador’s 2013 efforts to bring Edward Snowden there. If you remember, Snowden was traveling from Hong...
Read moreThe clever, interactive phishing campaign is a sign of increasingly complex social-engineering attacks, researchers warn.
Read moreThe clever, interactive phishing campaign is a sign of increasingly complex social-engineering attacks, researchers warn.
Read more
Recent Comments