Please turn on your JavaScript for this page to function normally.
identity theft
IT and security pros pressured to keep quiet about data breaches

Organizations globally are under tremendous pressure to address evolving threats like ransomware, zero-day vulnerabilities, and espionage, and they face challenges in …

Silicon Valley Bank
The SVB demise is a fraudster’s paradise, so take precautions

For those who haven’t followed the drama, Silicon Valley Bank has been shut down by the California Department of Financial Protection and Innovation, after a bank run that …

Coinbase
What can we learn from the latest Coinbase cyberattack?

Cryptocurrency exchange Coinbase has fended off a cyberattack that might have been mounted by the same attackers that targeted Twillio, Cloudflare and many other companies …

Hand
Cybercriminals exploit fear and urgency to trick consumers

Cybercriminals remained active in spying and information stealing, with lottery-themed adware campaigns used as a tactic to obtain people’s contact details, according to …

BEC scams
Cybercriminals exploit volatile job market for targeted email attacks

Between July–December 2022, the median open rate for text-based business email compromise (BEC) attacks was nearly 28%, according to Abnormal Security. Business email and …

email
Attackers used malicious “verified” OAuth apps to infiltrate organizations’ O365 email accounts

Malicious third-party OAuth apps with an evident “Publisher identity verified” badge have been used by unknown attackers to target organizations in the UK and …

Riot Games
Riot Games breached: How did it happen?

The hackers who breached Riot Games last week are asking for $10 million not to leak the stolen source code for the company’s popular League of Legends online game. The …

vectors
5 cybersecurity trends accelerating in 2023

Netwrix has released key cybersecurity trends that will affect organizations of all sizes in 2023. Here are five specific trends that you need to be aware of: The business of …

brain
Engage your employees with better cybersecurity training

Cybercriminals use a variety of tactics all at once and are constantly innovating. Organizations need to do the same and take a multidimensional approach to cybersecurity …

Eyes
Fake subscription invoices lead to corporate data theft and extortion

A threat actor dubbed Luna Moth has been leveraging social engineering and legitimate software to steal sensitive data and extort money from small and medium-size businesses. …

James Turgal
How to fortify elections and electoral campaigns against human hacking

In this interview for Help Net Security, James Turgal, VP of Cyber Risk, Strategy and Board Relations at Optiv, talks about election cybersecurity and how to keep elections …

social engineering attacks
Social engineering attacks anybody could fall victim to

Social engineering – also known as human hacking – is an expression that encompasses a number of methods and vectors attackers use to manipulate targets into …

Don't miss

Cybersecurity news