phishing - search results
If you're not happy with the results, please do another search
IT Professionals: Threat Intelligence is the Most Valued Skill to Combat AI-Powered Cyber Threats
As the cyber workforce skills gap persists, companies that fail to upskill their IT teams with the knowledge to defend themselves in the ever-changing...
What is the Polyfill incident trying to tell us, if we bother to listen
If you work in the security industry, you have likely heard about the polyfill.io incident that came into the public light a couple of...
Securing the Paris Olympic Games 2024: Ensuring Cyber Protection
As Paris gears up to host the 2024 Olympic Games, the city and its organizers face a monumental task not only in ensuring the...
Google Alphabet to acquire Cybersecurity business Wiz for $23 billion
Alphabet Inc., the parent company of Google, is set to acquire the cybersecurity startup Wiz for a substantial $23 billion in an all-cash deal...
mSpy Faces Major Data Breach Following Cyber Attack
mSpy, a popular cell phone tracking software utilized by millions, has recently made headlines due to a significant cyber attack that has compromised the...
The Top 4 Forms of AI-Enabled Cyber Threats
The face of cyber threats has transformed dramatically over the decades. At first, they emerged as hacks, viruses and denial of service attacks, often...
Human Risk Management: The Next Step in Mature Security Awareness Programs
In today's digital landscape, organizations face a myriad of security threats that evolve constantly. Among these threats, human risk remains one of the most...
How do financial lenders avoid cyber threats?
The evolving technological landscape has been transformative across most industries, but it’s arguably in the world of finance where the largest strides have been...
What is AI based Cyber Crime
Artificial Intelligence (AI) has revolutionized numerous fields, including cybersecurity. However, its application in cyber-crime represents a dual-edge sword, offering both innovative tools for attackers...
Apple Inc issues warning against Mercenary Spyware Cyber Attacks
Apple Inc. has issued a global warning to its iPhone users regarding a significant cybersecurity threat known as the Mercenary Spyware Attack. The alert...
MOST POPULAR
How healthcare cyber risk teams can plan ahead for HIPAA’s Security...
Enacted in 1996, the Health Insurance Portability and Accountability Act (HIPAA) has been the regulatory standard for U.S. healthcare providers, health organizations, and health...