phishing - search results
If you're not happy with the results, please do another search
Twilio data breach exposes millions of contact numbers
Users of Twilio, the cloud-based communication service provider, are being alerted to a security breach affecting Authy, its platform for multi-factor authentication. It has...
Safeguarding the Olympic Data Legacy: Sensitive Information Supply Chain Risks in the Digital Age
As the world eagerly anticipates the Paris 2024 Olympic Games, a less visible but equally crucial competition is underway: the race to protect the...
Harnessing AI to Thwart Ransomware Threats: A Strategic Approach
In today's interconnected digital landscape, ransomware has emerged as one of the most pervasive and damaging cyber threats. These malicious attacks target organizations of...
Australia looses $3 billion every year to Cyber Crime
Australia's leading financial institutions are bracing for what could be the most significant cyber attack in the history of the banking sector, with warnings...
Top Tips to Keep Data Safe During the 2024 Paris Olympics
It’s no secret that the Olympics is one of the most highly attended events in the world. This year, it is expected that the...
How to safeguard oneself from sectortion attacks online
Safeguarding oneself from sectortion attacks online is crucial in today's digital age where cyber threats continue to evolve. Se*tortion, a form of blackmail where...
CDK Global faced second ransomware attack
CDK Global, a prominent provider of software solutions for automotive sales and services across 15,000 dealerships, recently faced significant disruptions due to alleged ransomware...
AI in Cybersecurity: Friend or Foe?
How organizations can both leverage and defend against artificial intelligence (AI) in security operations.
While AI has been around for many years and isn’t a...
Defending Against Business Email Compromise: A Comprehensive Guide
In today's digital age, where email communication is integral to business operations, the threat of Business Email Compromise (BEC) looms large. BEC attacks are...
Internet Computer Protocol Launches Walletless Verified Credentials to Build Trust in the Public Discourse
Internet Computer Protocol (ICP), a decentralized blockchain network that extends the functionality of Web3 by overcoming the limitations of traditional blockchains and smart contracts,...
MOST POPULAR
How healthcare cyber risk teams can plan ahead for HIPAA’s Security...
Enacted in 1996, the Health Insurance Portability and Accountability Act (HIPAA) has been the regulatory standard for U.S. healthcare providers, health organizations, and health...