phishing - search results

If you're not happy with the results, please do another search

Twilio data breach exposes millions of contact numbers

Users of Twilio, the cloud-based communication service provider, are being alerted to a security breach affecting Authy, its platform for multi-factor authentication. It has...
Ccsp

Safeguarding the Olympic Data Legacy: Sensitive Information Supply Chain Risks in the Digital Age

As the world eagerly anticipates the Paris 2024 Olympic Games, a less visible but equally crucial competition is underway: the race to protect the...
AI Cyber Threat Image

Harnessing AI to Thwart Ransomware Threats: A Strategic Approach

In today's interconnected digital landscape, ransomware has emerged as one of the most pervasive and damaging cyber threats. These malicious attacks target organizations of...

Australia looses $3 billion every year to Cyber Crime

Australia's leading financial institutions are bracing for what could be the most significant cyber attack in the history of the banking sector, with warnings...

Top Tips to Keep Data Safe During the 2024 Paris Olympics

It’s no secret that the Olympics is one of the most highly attended events in the world. This year, it is expected that the...

How to safeguard oneself from sectortion attacks online

Safeguarding oneself from sectortion attacks online is crucial in today's digital age where cyber threats continue to evolve. Se*tortion, a form of blackmail where...

CDK Global faced second ransomware attack

CDK Global, a prominent provider of software solutions for automotive sales and services across 15,000 dealerships, recently faced significant disruptions due to alleged ransomware...
Cybersecurity Research

AI in Cybersecurity: Friend or Foe?

How organizations can both leverage and defend against artificial intelligence (AI) in security operations.  While AI has been around for many years and isn’t a...

Defending Against Business Email Compromise: A Comprehensive Guide

In today's digital age, where email communication is integral to business operations, the threat of Business Email Compromise (BEC) looms large. BEC attacks are...
Security+ Certification

Internet Computer Protocol Launches Walletless Verified Credentials to Build Trust in the Public Discourse

Internet Computer Protocol (ICP), a decentralized blockchain network that extends the functionality of Web3 by overcoming the limitations of traditional blockchains and smart contracts,...

MOST POPULAR

NEW REPORTS