Category: CyberSecurity-Insiders

Preventing sophisticated phishing attacks aimed at employees
13
Jul
2023

Stories from the SOC: OneNote MalSpam – Detection & response

[ This article was originally published here ] This blog was co-written with Kristen Perreault – Professional Cybersecurity and James…

Ransomware related news headlines trending on Google
13
Jul
2023

Ransomware attack exposes Swiss Hooligans data onto Dark Web

A ransomware attack that took place on the IT servers of Xplain in June this year, has exposed the details…

Get the AT&T Cybersecurity Insights Report: Focus on Healthcare
13
Jul
2023

Get the AT&T Cybersecurity Insights Report: Focus on Healthcare

[ This article was originally published here ] We’re pleased to announce the availability of the 2023 AT&T Cybersecurity Insights™…

Unveiling the Top Three Use Cases for SASE: Revolutionizing Network Security and Connectivity
12
Jul
2023

Unveiling the Top Three Use Cases for SASE: Revolutionizing Network Security and Connectivity

By Jaye Tillson, Director of Strategy, Organizations today face the constant challenge of securing their networks and connecting their distributed…

Cyber Attack news headlines trending on Google
12
Jul
2023

Cyber Attack news headlines trending on Google

Microsoft has hit the news headlines for repelling a cyber attack targeting government servers from Western Europe. The attack is…

The 5Ws of the Software Supply Chain — How Security Teams Can Prevent Costly Mistakes
12
Jul
2023

The 5Ws of the Software Supply Chain — How Security Teams Can Prevent Costly Mistakes

By , Co-Founder and CEO at  Software supply chain compromises have been top-of-mind for CISOs and their security teams for…

Ransomware attack on Hayward City of California
12
Jul
2023

Ransomware attack on Hayward City of California

Networked servers of the City of Hayward, California were hacked by a notorious ransomware gang demanding a double-digit figure in…

Understanding the Distinction: Ethical Hacking vs. Cybersecurity
12
Jul
2023

Understanding the Distinction: Ethical Hacking vs. Cybersecurity

In today’s digital landscape, the need for robust security measures is paramount. Two terms that often come up in discussions…

The Looming Threat of Business Email Compromise: Insights from John Wilson at Fortra
11
Jul
2023

The Looming Threat of Business Email Compromise: Insights from John Wilson at Fortra

The relentless wave of digital innovation has come with its share of threats. One such rising threat is Business Email…

What is identity and why is it important?
11
Jul
2023

What is identity and why is it important?

[ This article was originally published here ] What is identity?  Did you know that identity is actually a mathematical…

How social media compromises information security
11
Jul
2023

How social media compromises information security

[ This article was originally published here ] The content of this post is solely the responsibility of the author. …

Cyber Attack on Australia Ventia
11
Jul
2023

Cyber Attack on Australia Ventia

Ventia, an essential service provider to critical infrastructure in Australia and New Zealand was forced to pull down some of…