phishing - search results
If you're not happy with the results, please do another search
Cybereason announces the availability of Cybereason Mobile Threat Defense
Cybereason, the leader in future-ready attack protection, today announced the availability of Cybereason Mobile Threat Defense, powered by Zimperium. This is in response to...
Unveiling the 2024 VPN Risk Report: Key Vulnerabilities and the Shift to Zero Trust
Today’s distributed and cloud-centric work environment has triggered a shift in access methods from traditional virtual private networks (VPNs) to more robust security frameworks...
Criminal IP and Quad9 Collaborate to Exchange Domain and IP Threat Intelligence
Criminal IP, a renowned Cyber Threat Intelligence (CTI) search engine developed by AI SPERA, has recently signed a technology partnership to exchange threat intelligence...
LockBit using botnets to send 9 million emails
The New Jersey Cybersecurity and Communications Integration Cell (NJCCIC) recently issued a warning regarding the LockBit ransomware group's latest tactics. Dubbed the LockBit Black...
Stemming the Tide: Solving the Challenge of Password Reuse and Password-Stealing Malware
Password stealing malware is again rising with several attacks making the news cycle in recent months. For instance, a new password-stealing malware named Ov3r_Stealer...
Dell admits data breach of over 49 million customers via Cyber Attack
Dell, a leading technology services provider, has publicly announced that it is actively investigating allegations raised by a threat actor known as Menelik, who...
Defending Against Hackers in the Public Sector Is a Different Beast
The general perception of hackers is that they’re Mr. Robot-esque renegades who utilize futuristic technologies in order to single-handedly take down monolithic foes, like...
PRODUCT REVIEW: SYXSENSE ENTERPRISE
Today’s digital transformation is rapidly changing the IT and cybersecurity landscape: Remote work and the increased shift to the cloud has broadened the attack...
How to prevent social media data leak
In today's digital landscape, maintaining an active presence on social media platforms has become imperative for staying informed about societal trends, current events, and...
Safeguarding Your Family: Strategies for Achieving Data Security
In an age where digital information is omnipresent, ensuring the security of your family's data has become paramount. From personal finances to sensitive documents...
MOST POPULAR
How healthcare cyber risk teams can plan ahead for HIPAA’s Security...
Enacted in 1996, the Health Insurance Portability and Accountability Act (HIPAA) has been the regulatory standard for U.S. healthcare providers, health organizations, and health...