Cyber Safety Review Board classifies Log4j as ‘endemic vulnerability’

CSRB has released a report saying that the Log4j exploit is here to stay long-term, meaning businesses should be ready in case of a cyber attack. The post Cyber... Read more »

5 tips for securing SSH on your Linux servers

Jack Wallen offers 5 tips for securing Linux that you can take care of in 5 minutes or less. The post 5 tips for securing SSH on your Linux... Read more »

LinkedIn and Microsoft are the most impersonated brands in phishing attacks

LinkedIn was exploited in almost half of the phishing attempts seen by Check Point Research during the second quarter of 2022. The post LinkedIn and Microsoft are the most... Read more »

Leveraging the power of cyber fusion centers for organizational security

Cyber fusion centers provide advanced security capabilities. Learn how your organization can strengthen its cyberdefense mechanism through a cyber fusion center. The post Leveraging the power of cyber fusion... Read more »

Trellix finds business services top target of ransomware attacks

Ransomware groups are now starting to pick sides in the Russian-Ukrain conflict. Learn more about who and what are at risk. The post Trellix finds business services top target... Read more »

Why North Korean cybercriminals are targeting businesses with ransomware

Microsoft says a ransomware gang calling itself H0lyGh0st may be sponsored by the North Korean government as a way for the country to offset its struggling economy. The post... Read more »

Best VPN services for SMBs

VPNs are an essential component in small and medium-sized businesses’ cybersecurity toolkit. Here’s how leading VPN services for SMBs compare. The post Best VPN services for SMBs appeared first... Read more »

Brave uses Goggle to show only cybersecurity websites.

The independent search engine introduced its new feature that filters results. The post Brave uses Goggle to show only cybersecurity websites. appeared first on TechRepublic. Read more »

Cyberinsurers looking for new risk assessment models

As ransomware attacks increase, a number of difficulties have risen for cyberinsurers that will need to be addressed swiftly. The post Cyberinsurers looking for new risk assessment models appeared... Read more »

How to remove your saved passwords in Chrome

Given Chrome’s frequent security issues, Jack Wallen strongly believes you shouldn’t be saving your passwords to Google’s browser. Here, Jack shows you how to delete and prevent them from... Read more »
Subscribe to our Newsletter