How to Prevent Business Email Compromise: A Guide for 2026
Business email compromise attacks, otherwise known as BEC attacks, are when a hacker gains access to a corporate email account, then uses that account to…
Business email compromise attacks, otherwise known as BEC attacks, are when a hacker gains access to a corporate email account, then uses that account to…
Cybersecurity isn’t easy. Every day, attackers get a little smarter and a little quicker. And they always seem to have another trick up their sleeve.…
In classic martial arts movies, there’s always that one scene where the hero singlehandedly takes on a gang of oversized, overconfident goons. One by one,…
Background Windows endpoints ship “out of the box” with a great deal of functionality provided through both GUI and command line utilities. These native utilities…
Throughout our journey, we’ve always kept one thing at the center of everything we do: protect small to mid-sized businesses (SMBs) and their managed service…
Here we are! Another edition of Ask the Mac Guy. In this series, we’ve been discussing some of the basic principles around macOS security, such…
Throughout 2024, politics has been top of mind for a significant portion of the world’s population. By December, over two dozen countries will have held…
Preamble Last Monday night I was working late and a Slack alert came in from a monitoring tool I had built three days earlier. Axios…
Who doesn’t love a little friendly competition? Whether it’s Capture the Flag, a sales spiff, or even a family game night, competition can be a…
A North Korea-nexus threat actor compromised the widely used axios npm package, delivering a cross-platform remote access trojan to potentially millions of developer environments during…
On October 1, 2024, over six thousand people opened the Calculator application on their computer—all at the same time. But they weren’t solving any equations…
Elastic Security Labs released initial triage and detection rules for the Axios supply-chain compromise. This is a detailed analysis of the RAT and payloads. Introduction…