phishing - search results

If you're not happy with the results, please do another search

mSpy Faces Major Data Breach Following Cyber Attack

mSpy, a popular cell phone tracking software utilized by millions, has recently made headlines due to a significant cyber attack that has compromised the...

The Top 4 Forms of AI-Enabled Cyber Threats

The face of cyber threats has transformed dramatically over the decades. At first, they emerged as hacks, viruses and denial of service attacks, often...
Cybersecurity Certificate

Human Risk Management: The Next Step in Mature Security Awareness Programs

In today's digital landscape, organizations face a myriad of security threats that evolve constantly. Among these threats, human risk remains one of the most...

How do financial lenders avoid cyber threats?

The evolving technological landscape has been transformative across most industries, but it’s arguably in the world of finance where the largest strides have been...
AI Cyber Threat Image

What is AI based Cyber Crime

Artificial Intelligence (AI) has revolutionized numerous fields, including cybersecurity. However, its application in cyber-crime represents a dual-edge sword, offering both innovative tools for attackers...
Cybersecurity Insiders

Apple Inc issues warning against Mercenary Spyware Cyber Attacks

Apple Inc. has issued a global warning to its iPhone users regarding a significant cybersecurity threat known as the Mercenary Spyware Attack. The alert...

AI and Ethics: Expert Insights on the Future of Intelligent Technology

The history of artificial intelligence (AI) is a fascinating journey of innovation and discovery that spans decades. From the early days of simple machine...
Sscp

Ditch the Checkbox, Use Plain Language, Make It Real: How to Create an Information...

Information security policies are a table-stakes requirement for any significantly sized organization today but too often they are a mess composed of checkbox lists...

Strengthening Corporate Cyber Defenses Against Botnets

In today's interconnected digital landscape, the threat posed by botnets continues to evolve, presenting significant challenges to corporate cybersecurity. Botnets, networks of compromised devices...

Why User Experience Matters In Security Awareness Training

The human element is one of the biggest reasons why data breaches have risen in recent years. And even though most organizations have some...

MOST POPULAR

NEW REPORTS