Home Search
phishing - search results
If you're not happy with the results, please do another search
Different Types of Ethical Hackers: White, Black, and Grey Hats Explained
There are several types of ethical hackers depending on the hacker’s intent and goal. This article highlights the concepts of hacking and the different types of...
These are the 3 Ps for Thwarting BEC Attacks
Business email compromise (BEC) is a prevalent email threat to organizations and a lucrative business for hackers. BEC attacks have increased and become more...
Everything You Need to Know About the Evolution of Cyberthreats
The theory of evolution proposed by Charles Darwin is based on the concept of change in characteristics of a population over successive generations. An...
Accenture Hit by LockBit 2.0 Ransomware! Attackers Demand $50 Mn
Cyber intrusions by LockBit 2.0 ransomware operators are increasing across the globe. The Australian Cyber Security Centre (ACSC) recently warned about the rise in...
Identity as the New Perimeter
In this day and age, your identity is a shared asset. Be it a calling card, passport or license -- it’s the means by...
Misconfigured Amazon Bucket Exposes Personal Data of Millions of Senior Citizens
Whether it’s critical corporate data or students’ information, threat actors often misuse sensitive data obtained from security data breaches. Recently, security researchers from threat...
A CEO’s Guide to Cybersecurity
Agile methodologies and cloud-based services and models have become popular, and in accordance with this change, the c-suite has restructured processes within their organizations....
Suffered a Data Breach? Here’s the Immediate Action Plan
Sensitive information is like money to cybercriminals. Attackers leverage personally identifiable information (PII) exposed in data breaches to launch various cyberattacks or trade it...
Risk-based Vulnerability Management – Overdue for Automation
The digital world is a blink-and-you’ll-miss-it environment, and organizations need to move aggressively to shrink the exploitable vulnerability window. Adversaries are breaching the security...
Ransomware Continues its Marathon to New Records: Report
Cybercriminals always aim high when targeting organizations and demanding ransom. The pandemic has given opportunistic hackers time to come up with innovative phishing attacks...