Flipping the BEC funnel: Phishing in the age of GenAI
For years, phishing was just a numbers game: A malicious actor would slap together an extremely generic (and usually poorly-written)...
Read more →For years, phishing was just a numbers game: A malicious actor would slap together an extremely generic (and usually poorly-written)...
Read more →Adalanche provides immediate insights into the permissions of users and groups within an Active Directory. It’s an effective open-source tool...
Read more →In this Help Net Security interview, Yoav Nathaniel, CEO at Silk Security, discusses the evolution of cyber risk management strategies...
Read more →Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Social engineer reveals effective tricks...
Read more →“The Akira ransomware malware, which was first detected in Finland in June 2023, has been particularly active at the end...
Read more →A critical vulnerability in GitLab CE/EE (CVE-2023-7028) can be easily exploited by attackers to reset GitLab user account passwords. While...
Read more →2023 was the year of AI enterprise adoption, with 55% of organizations adopting AI into their workflows, according to a...
Read more →As we reflect on the cybersecurity landscape and the trajectories of threat vectors, it’s evident that we’re on the cusp...
Read more →Here’s a look at the most interesting products from the past week, featuring releases from Critical Start, Dasera, ID R&D,...
Read more →Two zero-day vulnerabilities (CVE-2023-46805, CVE-2024-21887) in Ivanti Connect Secure VPN devices are under active exploitation by unknown attackers, Volexity researchers...
Read more →Cisco has fixed a critical vulnerability (CVE-2024-20272) in Cisco Unity Connection that could allow an unauthenticated attacker to upload arbitrary...
Read more →In this Help Net Security, Alexander Hagenah, Head of Cyber Controls at SIX, discusses the critical steps in creating effective...
Read more →