Please turn on your JavaScript for this page to function normally.
face
AI and deepfakes fuel phishing scams, making detection harder

AI impersonation is now the hardest vector for cybersecurity professionals to protect companies against, according to Teleport. The study, which surveyed 250 senior US and UK …

cyber threat
Phishing scams and malicious domains take center stage as the US election approaches

Phishing scams aimed at voters, malicious domain registrations impersonating candidates, and other threat activity designed to exploit unassuming victims take center stage as …

attack
Evolving cybercriminal tactics targeting SMBs

A recent Todyl report revealed a 558% increase in BEC (Business Email Compromise), AiTM (Adversary-in-the-Middle), and ATO (Account Takeover) attacks in 2024. In this Help Net …

mobile device
What to do if your iPhone or Android smartphone gets stolen?

A lost, stolen, or compromised smartphone today means we are in serious trouble. Most people have everything related to their personal and professional lives stored on their …

cybercriminals video
Cybercrime’s constant rise is becoming everyone’s problem

Cybercrime in recent years shows no signs of slowing down, with phishing attacks surging and ransomware tactics becoming more advanced, forcing organizations to constantly …

healthcare cybersecurity
Data loss incidents impact patient care

92% of healthcare organizations experienced at least one cyber attack in the past 12 months, an increase from 88% in 2023, with 69% reporting disruption to patient care as a …

Airbnb, Booking
Scammers target Airbnb and Booking.com users

ESET researchers discovered that the organized scammer network Telekopye has expanded its operations to target users of popular accommodation booking platforms like …

cyber threat
GoldenJackal APT group breaches air-gapped systems in Europe

ESET researchers have discovered a series of attacks that took place in Europe from May 2022 to March 2024, where the attackers used a toolset capable of targeting air-gapped …

cybercrime
Cybercriminals capitalize on poorly configured cloud environments

Off-the-shelf offensive security tools and poorly configured cloud environments create openings in the attack surface, according to Elastic. Adversaries are utilizing …

fighting ransomware
Ransomware activity shows no signs of slowing down

Ransomware attacks have seen a significant resurgence, disrupting multiple sectors and affecting global supply chains. Despite efforts to disrupt major ransomware groups, …

email
Organizations are making email more secure, and it’s paying off

Compromised identities have been a central component of countless costly breaches this year, according to Red Canary. Rise in identity and cloud-native attacks While most of …

online fraud
Discover how online fraud can impact your business

Recent reports underscore increased fraud losses driven by both old methods and new technologies. As fraudsters exploit advancements in AI and other sophisticated tools, their …

Don't miss

Cybersecurity news