56% of cyber insurance claims originate in the email inbox
56% of all 2023 claims were a result of funds transfer fraud (FTF) or business email compromise (BEC), highlighting the importance of email security as…
56% of all 2023 claims were a result of funds transfer fraud (FTF) or business email compromise (BEC), highlighting the importance of email security as…
In a federal courtroom today, a Florida man received a 48-month prison sentence for his involvement in laundering the proceeds of scams targeting American consumers…
The U.S. government charged four Iranian nationals for their alleged involvement in multi-year hacking operations targeting several prominent entities including the U.S. Treasury and State…
AHAD, a cybersecurity, digital transformation, and risk management company, has announced the appointment of Somnath Sarkar as its Chief Information Security Officer (CISO). With over…
Cyble Research & Intelligence Labs (CRIL) recently discovered evidence suggesting that the threat actors behind the DragonForce ransomware group might have leveraged a leaked LockBit…
KnowBe4, the leader in security awareness training and simulated phishing platforms, has announced its definitive agreement to acquire Egress, a pioneer in adaptive and integrated…
Cybersecurity experts at Seqrite Labs have reported a surge in cyberattacks against Indian government entities. These attacks have been attributed to Pakistani Advanced Persistent Threat…
Dinesh Kumar Shrimali has become the Chief Information Security Officer (CISO) and Data Protection Officer (DPO) of Tata Steel Ltd., one of the largest and…
The Qiulong ransomware group has taken responsibility for a cyberattack on renowned Brazilian plastic surgeon Dr. Willian Segalin. The alleged Dr Willian Segalin cyberattack was…
Google fixed critical Chrome vulnerability CVE-2024-4058 Pierluigi Paganini April 25, 2024 Google addressed a critical Chrome vulnerability, tracked as CVE-2024-4058, that resides in the ANGLE…
Google has announced that external participants without Google accounts can join client-side encrypted Google Meet calls. This move marks a substantial step in balancing user…
Attackers are employing evasion techniques to bypass detection and extend dwell time on compromised systems. This is achieved by targeting unmonitored devices, leveraging legitimate tools,…