AI vs AI: Next front in phishing wars

Threat intelligence firm Abnormal Software is seeing cybercriminals using generative AI to go phishing; the same technology is part of the defense. The post AI vs AI: Next front... Read more »

Akamai’s new study: Bots, phishing and server attacks making commerce a cybersecurity hotspot

The study shows attackers are using more bots and doing more sophisticated phishing exploits and server attacks, especially targeting retail. The post Akamai’s new study: Bots, phishing and server... Read more »

CISA advisory on LockBit: $91 million extorted from 1,700 attacks since 2020

FBI, CISA and international organizations released an advisory detailing breadth and depth of LockBit, and how to defend against the most prevalent ransomware of 2022 and (so far) 2023.... Read more »

Hiring kit: Cryptographer

A cryptographer uses their expertise in mathematics and computer science to develop algorithms, ciphers and other encryption systems to protect sensitive data. It can be a difficult position to... Read more »

New phishing and business email compromise campaigns increase in complexity, bypass MFA

Read the technical details about a new AiTM phishing attack combined with a BEC campaign as revealed by Microsoft, and learn how to mitigate this threat. The post New... Read more »

Cyberattacks surge to 61% of small and medium-sized businesses, says study

A poll of security software buyers shows 39% of small and medium-sized businesses lost customer data due to cyberattacks. The post Cyberattacks surge to 61% of small and medium-sized... Read more »

DDoS threats and defense: How certain assumptions can lead to an attack

The assumptions a business shouldn’t make about its DDoS defenses and the steps it should take now to reduce its likelihood of attack. The post DDoS threats and defense:... Read more »

Google’s ChromeOS aims for enterprise with security and compatibility

Google’s ChromeOS is not just for Chromebooks. Thomas Riedl, the Google unit’s head of enterprise, sees big growth opportunities for the OS where security and versatility matter most. The... Read more »

Equipment reassignment checklist

The reassignment of existing equipment takes place when employees leave the organization or receive new computers, mobile devices, printers and other assets. It is essential to follow strict guidelines... Read more »

Firm study predicts big spends on generative AI

A new study polling software buyers at businesses worldwide finds strong intention to increase budget, with special interest in AI. It also looks at how vendors can engage buyers.... Read more »
Subscribe to our Newsletter