phishing - search results

If you're not happy with the results, please do another search

Can a Cyber Threat Abruptly Evolve into a Ransomware Attack

In today's digital landscape, the evolution of cyber threats poses significant challenges for individuals and organizations alike. One pressing concern is the sudden escalation...

USA initiates $50m incentive program to thwart ransomware threats

In a groundbreaking move, the US Department of Health and Human Services (HHS) has introduced a $50 million initiative aimed at bolstering cybersecurity defenses...
Cissp Certification

5 steps to stop Ransomware as a Service in its tracks

The UK government’s annual Cyber Security Breaches Survey has revealed that 50% of businesses have faced a cyberattack or breach in the past 12...
phishing attacks image

7 Essential Security Tips to Identify Fake Mobile Apps

In today's digital age, mobile applications have become an integral part of our daily lives, facilitating various tasks from communication to banking. However, with...

How do cybercriminals use artificial intelligence?

The world is becoming increasingly digital, and innovative technological advancements such as artificial intelligence (AI) are evolving at an alarming rate. But unfortunately, as...

Digital diagnosis: Why are email security breaches escalating in healthcare?

Last year, 1 in 3 people in the US were hit by healthcare data breaches in a record year for cyber-attacks on the sector,...
Nist Framework

Cybereason announces the availability of Cybereason Mobile Threat Defense

Cybereason, the leader in future-ready attack protection, today announced the availability of Cybereason Mobile Threat Defense, powered by Zimperium. This is in response to...
News Cybersecurity USA

Unveiling the 2024 VPN Risk Report: Key Vulnerabilities and the Shift to Zero Trust

Today’s distributed and cloud-centric work environment has triggered a shift in access methods from traditional virtual private networks (VPNs) to more robust security frameworks...

Criminal IP and Quad9 Collaborate to Exchange Domain and IP Threat Intelligence

Criminal IP, a renowned Cyber Threat Intelligence (CTI) search engine developed by AI SPERA, has recently signed a technology partnership to exchange threat intelligence...

LockBit using botnets to send 9 million emails

The New Jersey Cybersecurity and Communications Integration Cell (NJCCIC) recently issued a warning regarding the LockBit ransomware group's latest tactics. Dubbed the LockBit Black...

MOST POPULAR

NEW REPORTS