30 minutes agoSophisticated Phishing Campaign Exploits Microsoft Office FormsAccording to Perception Point, cyber attackers are exploiting Microsoft Office Forms to execute sophisticated two-step phishing...
35 minutes agoNavigating the Financial Fallout: Sam Peters on Deepfake Threats and Business SecurityDive into our conversation with Sam Peters, Chief Product Officer at ISMS.online, as he discusses the financial impacts businesses face...
24 hours agoWhy Data Breaches Are On The Rise WorldwideThis guest post was contributed by Mark Cunningham-Dickie, Principal Incident Response Consultant, Quorum Cyber In 2023, there were 2,365...
24 hours agoTricking Potential Insider Threats With Deception TechnologyThis guest post was contributed by Zachary Amos, Features Editor, ReHack In cybersecurity, insider threats exploit authorized access to...
1 day agoCybersecurity Community Skeptical of USDoD's Alleged CrowdStrike Data LeakIn a recent development within the cybersecurity world, a threat group identified as USDoD has claimed responsibility for acquiring a...