Proactive Security: What It Means for Enterprise Security Strategy
Automotive icon Henry Ford is credited with saying, “If you do what you’ve always done, you’ll get what you’ve always got.” It rings true for Read More
Automotive icon Henry Ford is credited with saying, “If you do what you’ve always done, you’ll get what you’ve always got.” It rings true for Read More
Threat actors are employing an existing technique of zero-point font obfuscation in a new way to fool Microsoft Outlook users into believing phishing emails have Read More
An old Chinese state-linked threat actor has been quietly manipulating Cisco routers to breach multinational organizations in the US and Japan. “BlackTech” (aka Palmerworm, Temp.Overboard, Read More
Researchers have recently discovered a sophisticated backdoor with unusual architecture, dubbed “Deadglyph,” used in a cyber-espionage attack in the Middle East against a government agency. Read More
The modern internet is a terrible, no-good privacy nightmare and we should probably start over. At least that’s the argument that spawned the latest project Read More
Businesses using Google Workspace are only half as likely to suffer a reportable cyberattack compared to companies using Microsoft 365, according to claims data collected Read More
Basic security hygiene is more impactful than you may realize. While industry headlines are often dominated by emerging tech and the latest software or hardware Read More
One of the more pervasive online threats comes from cybercriminals programming bots to roam the Internet looking for ways to manipulate online pages, access databases, Read More
Recent headlines have cast a spotlight on the evolving nature of cyber threats and their ripple effects across industries, accentuating the value of sensitive information Read More
The cybercriminals behind a sophisticated Android banking Trojan called Xenomorph, who have been actively targeting users in Europe for more than a year, recently set Read More