Please turn on your JavaScript for this page to function normally.
face
It only takes one over-privileged identity to do major damage to a cloud

While moving to the cloud increases efficiency and business agility, security strategies haven’t been adapted to account for this shift and traditional tools can’t effectively …

BEC scams
Expert strategies for defending against multilingual email-based attacks

BEC (Business Email Compromise) attacks have become increasingly prevalent in recent years, with cybercriminals using a variety of tactics to gain access to sensitive …

SaaS
Security teams have no control over risky SaaS-to-SaaS connections

Employees are providing hundreds to thousands of third-party apps with access to the two most dominant workspaces, Microsoft 365 and Google Workspace, according to Adaptive …

USA
10 US states that suffered the most devastating data breaches in 2022

Cyber attack risks faced by businesses across states and reported data breaches are relative to the respective state governments’ cybersecurity investment, according to …

thief
Resecurity identified the investment scam network Digital Smoke

Resecurity identified one of the largest investment fraud networks by size and volume of operations created to defraud Internet users from Australia, Canada, China, Colombia, …

warning scam
FTC reveals alarming increase in scam activity, costing consumers billions

Newly released Federal Trade Commission (FTC) data shows that consumers reported losing nearly $8.8 billion to fraud in 2022, an increase of more than 30 percent over the …

network
Foiling intellectual property theft in a digital-first world

In today’s data-driven world, the expectations and demands faced by many organizations worldwide are reaching unseen levels. To meet the challenge, a data-driven approach is …

idea
Stay one step ahead: Cybersecurity best practices to prevent breaches

In this Help Net Security video, Caroline Wong, Chief Strategy Officer at Cobalt, offers valuable insight into what leaders can do to instill stronger cybersecurity practices …

biohazard
Wiper malware goes global, destructive attacks surge

The threat landscape and organizations’ attack surface are constantly transforming, and cybercriminals’ ability to design and adapt their techniques to suit this evolving …

risk
Third-party risks overwhelm traditional ERM setups

Enterprise risk management (ERM) teams are struggling to effectively mitigate third-party risk in an increasingly interconnected business environment, according to Gartner. …

week in review
Week in review: ChatGPT and cybersecurity, hidden vulnerabilities in Docker containers

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Google Protected Computing: Ensuring privacy and safety of data regardless of …

ransomware
Defenders on high alert as backdoor attacks become more common

Although ransomware‘s share of incidents declined only slightly from 2021 to 2022, defenders were more successful detecting and preventing ransomware, according to IBM. …

Don't miss

Cybersecurity news