Home Search

phishing - search results

If you're not happy with the results, please do another search
types of ethical hackers

Different Types of Ethical Hackers: White, Black, and Grey Hats Explained

0
There are several types of ethical hackers depending on the hacker’s intent and goal. This article highlights the concepts of hacking and the different types of...
BEC Attacks

These are the 3 Ps for Thwarting BEC Attacks

0
Business email compromise (BEC) is a prevalent email threat to organizations and a lucrative business for hackers. BEC attacks have increased and become more...
cyberthreats, bug

Everything You Need to Know About the Evolution of Cyberthreats

0
The theory of evolution proposed by Charles Darwin is based on the concept of change in characteristics of a population over successive generations. An...
Accenture ransomware attack, South Africa Justice Department

Accenture Hit by LockBit 2.0 Ransomware! Attackers Demand $50 Mn

0
Cyber intrusions by LockBit 2.0 ransomware operators are increasing across the globe. The Australian Cyber Security Centre (ACSC) recently warned about the rise in...
Identity Access

Identity as the New Perimeter

0
In this day and age, your identity is a shared asset. Be it a calling card, passport or license -- it’s the means by...
Senior citizens data

Misconfigured Amazon Bucket Exposes Personal Data of Millions of Senior Citizens

0
Whether it’s critical corporate data or students’ information, threat actors often misuse sensitive data obtained from security data breaches. Recently, security researchers from threat...
CEO, cybersecurity, CISO, Future of the CISO

A CEO’s Guide to Cybersecurity

0
Agile methodologies and cloud-based services and models have become popular, and in accordance with this change, the c-suite has restructured processes within their organizations....
data breach

Suffered a Data Breach? Here’s the Immediate Action Plan

0
Sensitive information is like money to cybercriminals. Attackers leverage personally identifiable information (PII) exposed in data breaches to launch various cyberattacks or trade it...
Microsoft 2022 flaw, Cybersecurity interest, Personnel Security Program

Risk-based Vulnerability Management – Overdue for Automation

0
The digital world is a blink-and-you’ll-miss-it environment, and organizations need to move aggressively to shrink the exploitable vulnerability window. Adversaries are breaching the security...
Ransomware Attacks, Graff ransomware attack

Ransomware Continues its Marathon to New Records: Report

0
Cybercriminals always aim high when targeting organizations and demanding ransom. The pandemic has given opportunistic hackers time to come up with innovative phishing attacks...