phishing - search results
If you're not happy with the results, please do another search
mSpy Faces Major Data Breach Following Cyber Attack
mSpy, a popular cell phone tracking software utilized by millions, has recently made headlines due to a significant cyber attack that has compromised the...
The Top 4 Forms of AI-Enabled Cyber Threats
The face of cyber threats has transformed dramatically over the decades. At first, they emerged as hacks, viruses and denial of service attacks, often...
Human Risk Management: The Next Step in Mature Security Awareness Programs
In today's digital landscape, organizations face a myriad of security threats that evolve constantly. Among these threats, human risk remains one of the most...
How do financial lenders avoid cyber threats?
The evolving technological landscape has been transformative across most industries, but it’s arguably in the world of finance where the largest strides have been...
What is AI based Cyber Crime
Artificial Intelligence (AI) has revolutionized numerous fields, including cybersecurity. However, its application in cyber-crime represents a dual-edge sword, offering both innovative tools for attackers...
Apple Inc issues warning against Mercenary Spyware Cyber Attacks
Apple Inc. has issued a global warning to its iPhone users regarding a significant cybersecurity threat known as the Mercenary Spyware Attack. The alert...
AI and Ethics: Expert Insights on the Future of Intelligent Technology
The history of artificial intelligence (AI) is a fascinating journey of innovation and discovery that spans decades. From the early days of simple machine...
Ditch the Checkbox, Use Plain Language, Make It Real: How to Create an Information...
Information security policies are a table-stakes requirement for any significantly sized organization today but too often they are a mess composed of checkbox lists...
Strengthening Corporate Cyber Defenses Against Botnets
In today's interconnected digital landscape, the threat posed by botnets continues to evolve, presenting significant challenges to corporate cybersecurity. Botnets, networks of compromised devices...
Why User Experience Matters In Security Awareness Training
The human element is one of the biggest reasons why data breaches have risen in recent years. And even though most organizations have some...
MOST POPULAR
69% of Businesses Are Adopting SSE: Discover Why in this New...
Hybrid work is the new reality for many businesses, but it also poses new challenges for cybersecurity. CISOs and security architects need to rethink...