Please turn on your JavaScript for this page to function normally.
Phone
When a scammer calls: 3 strategies to protect customers from call spoofing

One of the first internet memes was born when The New Yorker published the now iconic cartoon captioned, “On the internet, no one knows you’re a dog.” Today we might update …

attacks
Increase in credential phishing and brute force attacks causing financial and reputational damage

Abnormal Security released a report which examines the escalating adverse impact of socially-engineered and never-seen-before email attacks, and other advanced email …

Cyber criminals are targeting digital artists

Cyber criminals looking for a quick payout and valuables are targeting digital artists using NFTs (non-fungible tokens), warns security researcher Bart Blaze. The attackers …

cloud
Investing in the right future for the cloud

In the last decade we have seen cloud technology evolve from a useful competitive business tool to one of the key foundations of the business world. Migrating assets, …

Amazon
Fake Amazon order emails lead to vishing

Fraudsters are sending out fake Amazon order emails and tricking online shoppers into calling a telephone number manned by them to steal the shoppers’ credit card …

gap
85% of breaches involve the human element

The 2021 Verizon Data Breach Investigations Report (DBIR) examines more breaches than ever before, and sheds light on how the most common forms of cyber attacks affected the …

attacks
Attack volume surged by 48% during the first year of the pandemic

A Mimecast report details how threat actors targeted remote workers during the first year of the pandemic, March 2020 – February 2021. The report describes how attack volume …

email
New phishing campaign targets taxpayer credentials

A new phishing campaign is targeting U.S. taxpayers with documents that purport to contain tax-related content, but ultimately deliver NetWire and Remcos malware – two …

Eyes
Security researchers targeted by North Korean hackers

Over the past few months, hackers have been trying to surreptitiously backdoor the computer systems of a number of security researchers working on vulnerability research and …

laptop
Is poor cyber hygiene crippling your security program?

Cybercriminals are targeting vulnerabilities created by the pandemic-driven worldwide transition to remote work, according to Secureworks. The report is based on hundreds of …

Office 365
Cybercriminals are using legitimate Office 365 services to launch attacks

Vectra released its report on Microsoft Office 365, which highlights the use of Office 365 in enterprise cyberattacks. The report explains how cybercriminals use built-in …

ATM
ATM cash-out: A rising threat requiring urgent attention

The PCI Security Standards Council (PCI SSC) and the ATM Industry Association (ATMIA) issued a joint bulletin to highlight an increasing threat that requires urgent awareness …

Don't miss

Cybersecurity news