For SOC teams, the analytics and automation hype is real –...

0
Tools for analytics and automation are providing today’s SOC teams with enhanced visibility, improved productivity,...

SMS tax scam unmasked: Bogus but believable – don’t fall for...

0
Every month of the year has some sort of tax relevance somewhere in the world, and tax scamming cybercrooks take advantage of the...

Hacker Personas Explained: Know Your Enemy and Protect Your Business

0
In today’s rapidly evolving cybersecurity landscape, the battle for privacy and security is relentless. Cybercriminals are masters at using technology and psychology to...

Working at a safe distance, safely: Remote work at industrial sites...

0
When workers need to get things done in a dangerous locale, sometimes they have to...

Ransomware Attackers Set Their Sights on SaaS

0
Ransomware has begun to target data-heavy SaaS applications, open source, and Web and application frameworks.Ransomware attacks have begun to more heavily target software...

Pre-Valentine’s Day Malware Attack Mimics Flower, Lingerie Stores

0
Emails pretending to confirm hefty orders from lingerie shop Ajour Lingerie and flower store Rose World are actually spreading the BazaLoader malware.Source link...

Top 100 Cybersecurity Lists

0
Top 100 Cybersecurity Startups Top 100 CISOs Top 100 Women in Cybersecurity Top 100 Black Unicorns What other Top 100 lists are you looking for and we’ll...

Growing Collaboration Among Criminal Groups Heightens Ransomware Threat for Healthcare Sector

0
Expect increase in ransomware and 'triple extortion' attacks, Cyber Threat Intelligence League says. Increased communication and collaboration among cybercrime groups is heightening the ransomware...

India Calls Out Twitter for Differential Treatment

0
Twitter has been issued a non-compliance notice by the Indian government for failing to block accounts used to spread misinformation and provoke violence.Prime...

Recent Posts