Business email compromise attacks now targeting people via SMS messages

No longer limited to email, BEC attacks are hitting users through text messages in an attempt to steal money or commit other types of fraud, says Trustwave. The post... Read more »

Top industrial IoT security solutions

From safety to where? Find out the right way to turn with this comprehensive analysis of seven options for your business. The post Top industrial IoT security solutions appeared... Read more »

Iranian state-aligned threat actor targets new victims in cyberespionage and kinetic campaigns

New research from Proofpoint exposes a large shift in the TA453 threat actor’s modus operandi, which started conducting more hostile attacks. The post Iranian state-aligned threat actor targets new... Read more »

Improper use of password managers leaves people vulnerable to identity theft

A password manager can be a useful and effective tool for creating, controlling and applying complex and secure passwords, but if you don’t use it the right way, you... Read more »

Security alert: Use these most popular passwords at your peril

Yes, there’s a good chance “123456” is the code to the restroom at your local Starbucks, but it is also the second most popular password worldwide, according to a... Read more »

Open source code for commercial software applications is ubiquitous, but so is the risk

As the SolarWinds and Log4j hacks show, vulnerabilities in open source software used in application development can open doors for attackers with vast consequences. A new study looks at... Read more »

Demo Video – Continuous Data Protection (German)

Eliminate outages and minimize data loss for Tier 1 VMware workloads with built-in Continuous Data Protection (CDP) and get instant restores to the most recent state or point in... Read more »

Cybersecurity adoption hampered by shortage of skills and poor product integration

A limited security budget was also a top obstacle for CISOs and IT decision makers, according to a recent survey from BlackFog. The post Cybersecurity adoption hampered by shortage... Read more »

How to use folders in Bitwarden to manage passwords for project teams

If your project team members need to share passwords, learn how to use Bitwarden’s Folders feature. The post How to use folders in Bitwarden to manage passwords for project... Read more »

Apple unveils new iMessage, Apple ID and iCloud security for high-value targets

Tech firm aims to strengthen security for users and meet modern cyber threat challenges with new cybersecurity technology and end-to-end cloud encryption. The post Apple unveils new iMessage, Apple... Read more »
Subscribe to our Newsletter