Don't let mistakes bother you

If you don't care, you may become a victim of spam

What does business email compromise look like?

Business email compromise (BEC) is the digital con dressed to impress. It’s clean, calculated, and ready […]

What are the types of ransomware attacks?

Ransomware isn’t an isolated, potential cyber threat—it’s like a living organism that can shapeshift with multiple […]

Take control: Locking down common endpoint vulnerabilities

Attackers are constantly on the prowl, scoping out vulnerabilities of network-connected devices in your systems. These […]

How to prevent business email compromise

Business email compromise (BEC) is the cyber equivalent of an expertly forged handwritten note—no malware fireworks, […]

Know the red flags: Business email compromise signs to look out for

When it comes to cyber threats, business email compromise (BEC) is one of the sneakiest, most […]

Cyber defense: From reactive to proactive

When systems are attacked, we should respond. But how much better would it be if we […]

Shai-Hulud-style NPM worm hits CI pipelines and AI coding tools

A massive Shai-Hulud-style npm supply chain worm is hitting the software ecosystem, burrowing through developer machines, […]

Bitcoin-Milliarden von Raubkopie-Portal im Visier der Justiz

Urheberrechtsverstöße sind ein einträglisches Geschäft. PXLR Studio – shutterstock.com In Leipzig hat der Prozess um den […]

It’s time to rethink CISO reporting lines

Despite inroads in the C-suite and rising prominence across the business at large, security leaders are […]

The rise of the evasive adversary

Since the earliest days of the internet, there has never been a let-up in adversarial activity. […]

1 2 3 352