Home Search
phishing - search results
If you're not happy with the results, please do another search
Integrating Ethics with Technology
Tech is not above us. It should be governed by all of us, by our democratic institutions. It should play by the rules of...
“Security patching should be a part of a system’s basic maintenance procedure”
A well-rounded and seasoned leader in the field of IT & Information Security, Ashish Thapar is the Vice President and Head for Security Consulting...
Cyberthreats Still Loom Over E-learning Platforms
The year 2020 is certainly a year of change. The pandemic changed every aspect of our lives, keeping people more connected than ever virtually....
Speed is the Reason Why 1 In 3 Employees Do Not Use VPN
Cybersecurity, digital investigations, and eDiscovery will never be the same. Market uncertainty and changing consumer behavior have increased cybercrime and fraud, while remote workforces...
Information Technology Internal Audit Considerations Amidst COVID-19
The COVID-19 pandemic, as an unpredictable event, has triggered a ripple effect on people, businesses, governments, and society as a whole. Resultantly, organizations resorted...
Cybersecurity After COVID-19
In addition to the health and economic impacts of COVID-19, society had to grapple with a plethora of new and persistent cybersecurity threats. As...
CISOs are Struggling with Continuous Security Debts: Surveys
With the increase in the volume of cyberattacks, security leaders are changing their cybersecurity measures accordingly. However, cybercriminals too become consistent in advancing their...
“Every bit of compromised PII can be used for social engineering attacks to target...
Marcus Fowler is Director of Strategic Threat at Darktrace. Before joining Darktrace in 2019, he spent 15 years at the Central Intelligence Agency (CIA)...
Saint Bot – A New Malware Downloader Spotted
Security experts from Malwarebytes discovered a new malware strain used in phishing attacks to install credential stealers and additional malware payloads. Tracked as Saint...
Malvertising Mayhem: Here’s Everything You Need to Know
Cybercriminals often create innovative malware variants and malicious campaigns to steal users’ identities or private information. In most malware-related attacks, threat actors deploy malware...