Home Search

remote work - search results

If you're not happy with the results, please do another search
Artificial Intelligence

As Cybercriminals Evolve, So Must AI

0
Cyber actors are continually evolving, changing and strengthening their attack methods but also changing their attack vectors and targets. As we’ve seen during the...

FBI Warns Enterprises About Rising Vishing Attacks

0
The FBI is warning about threat actors targeting remote employees by exploiting network misconfigurations and remote workforce access privileges. The agency has issued a...
2021 Security Predictions

2021 Security Predictions: Endpoint Security is of Utmost Importance

0
2020 has been an unforgettable year – from a virus upending the world to a sudden shift to remote workforce, we have seen it...
Dmitry

Big Game Hunting was gaining momentum in 2020: Dmitry Volkov

0
The global shift to remote work due to the COVID-19 pandemic and massive downsizing have catalyzed a spike in cybercrime. In 2020, the majority...
cybersecurity predictions 2021

2021 Predictions: Holistic, Centralized, Software-Defined, and Automated Security that is Everywhere

0
The year that has been 2020 has been a cornucopia for cybercriminals who have been able to feast off an extended attack surface, a...
data breaches, top 9 data breaches, top data breaches in 2020, data breaches in 2020, data breach 2020, top data breaches, twitter hack, twitter data breach, Zoom data breach, Unacademy data breach, BigBasket data breach, Nintendo data breach, Marriot data breach, EasyJet data breach, SolarWinds hack, SolarWinds hacking, SolarWinds data breach,

A Look Back at the Top 9 Data Breaches of 2020

0
At the beginning of the year, people celebrated the turn of the decade and readied themselves to strike off the “Things-to-Do” from their bucket...
Insider attacker leak data

Insider Threats: A Byproduct of the New Normal

0
Despite the continuous security improvements, the concern over insider threats seems to be growing for organizations globally. The new distributed working conditions have also...
Credential Abuse Attack, credential harvesting campaign

APTs: The Epidemic That Went Under the Radar

0
Identifying cyber threats and anomalies is like finding a needle in a haystack. It is safe to say that with advanced persistent threats (APTs)...
microsoft, flaws in SonicWall SRA SMA

These are the Top Security Concerns and Cyberthreats Globally

0
A survey from cloud security provider Trend Micro revealed that 23% of organizations globally suffered seven or more cyberattacks. Nearly 83% of organizations surveyed...
BEC Scammers Exploit Email Auto-Forwarding Rules, FBI warns

BEC Scammers Exploit Email Auto-Forwarding Rules, FBI warns

0
The FBI is warning organizations in the U.S. about the risks posed by email auto-forwarding rules. According to a Private Industry Notification (PIN) from...