Cybercriminals turn to AI to bypass modern email security measures
Cybercriminals employ artificial intelligence (AI) to create complex email threats like phishing and business email compromise (BEC) attacks, while modern...
Read more →Cybercriminals employ artificial intelligence (AI) to create complex email threats like phishing and business email compromise (BEC) attacks, while modern...
Read more →In this Help Net Security interview, Roland Atoui, Managing Director at Red Alert Labs, discusses the intricacies of transitioning from...
Read more →While H1 2023 saw an encouraging decrease in the overall number of data breaches impacting healthcare organizations, it was overshadowed...
Read more →Juniper Networks has fixed four vulnerabilities (CVE-2023-36844, CVE-2023-36845, CVE-2023-36846, CVE-2023-36847) in Junos OS that, if chained together, could allow attackers...
Read more →As the adoption of cloud-based and mobile-access security systems continues to increase among both new and established businesses, the lines...
Read more →As cloud infrastructures become increasingly API-driven and dynamically spread across expansive attack surfaces, achieving clarity proves difficult. Compounding this challenge...
Read more →Open-Source Intelligence (OSINT) refers to gathering, assessing, and interpreting public information to address specific intelligence queries. All the tools listed...
Read more →RARLAB has fixed a high-severity RCE vulnerability (CVE-2023-40477) in the popular file archiver tool WinRAR. About CVE-2023-40477 A widely used...
Read more →Google will be extending the Safety check feature within the Chrome browser to alert users when a previously installed extension...
Read more →There is a standard playbook and best practice for when an organization discovers or is notified about a software vulnerability:...
Read more →In this Help Net Security interview, David Gugelmann, CEO at Exeon, sheds light on the current cyber threats and their...
Read more →Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Deception technology and breach anticipation...
Read more →