Hiring entry-level and junior candidates can alleviate the cybersecurity skills shortage

Hiring managers must avoid unrealistic job descriptions and placing too much emphasis on experience alone, according to a new report from (ISC)². The post Hiring entry-level and junior candidates... Read more »

New botnet and cryptominer Panchan attacking Linux servers

Panchan is going after telecom and education providers using novel and unique methods to thwart defenses and escalate privileges. The post New botnet and cryptominer Panchan attacking Linux servers... Read more »

Half of IT leaders say passwords too weak for security purposes

Most IT leaders are worried about passwords being stolen at their organization, according to a survey from Ping Identity. The post Half of IT leaders say passwords too weak... Read more »

State-sponsored Chinese threat actors compromise telecommunications and network services providers

Threat actors originating from the People’s Republic of China are exploiting known vulnerabilities to build a broad network infrastructure of compromised machines worldwide. Learn more about how to protect... Read more »

Bitwarden vs LastPass: Compare top password managers

If you’re like most people, you may become overwhelmed by the number of passwords created, used and remembered in your everyday life. Password managers like Bitwarden and LastPass make... Read more »

A cybercriminal stole 1 million Facebook account credentials over 4 months

A large-scale phishing attack was uncovered by PIXM, as well as the person who had been carrying out the attacks. The post A cybercriminal stole 1 million Facebook account... Read more »

Work smarter and safer from anywhere with Getflix VPN

Need to be able to work from anywhere without compromising on security or speed? Getflix Smart DNS & VPN has you covered. The post Work smarter and safer from... Read more »

Bitwarden vs 1Password: Password manager comparison

Security is at the heart of every business transaction carried out over the internet. Consequently, websites and web applications are becoming strict with their password requirements. The post Bitwarden... Read more »

Cybercriminals use automated bot to bypass 2FA authentication at wide scale

Cybercriminals are bypassing two-factor authentication using fraudulent online bot services automating phone calls, targeting multiple countries. Read more about how to protect from this threat. The post Cybercriminals use... Read more »

Ransomware: A Beginner’s Guide to Threat Detection

If you have been following the news, you’ll have most certainly been bombarded by the term ransomware. Almost every week, another large company publicly discloses being impacted by this... Read more »
Subscribe to our Newsletter