8 hours agoSophisticated Phishing Campaign Exploits Microsoft Office FormsAccording to Perception Point, cyber attackers are exploiting Microsoft Office Forms to execute sophisticated two-step phishing...
8 hours agoNavigating the Financial Fallout: Sam Peters on Deepfake Threats and Business SecurityDive into our conversation with Sam Peters, Chief Product Officer at ISMS.online, as he discusses the financial impacts businesses face...
Jul 19Cybersecurity Expert Sound Off: Global IT Outage Due to Microsoft and CrowdStrike : 911 Call Centers, Hospitals, and Airlines ImpactedIn an unprecedented IT outage, Microsoft experienced a widespread disruption on Friday morning, affecting critical infrastructures such...
Jul 18Software Security: Time for a RethinkThis guest post was contributed by Laszlo Drajko, Partner and Founder of Cydrill. In today's interconnected world, the question isn't...
Jul 11Practical Advice for Effective Threat Exposure Detection Across the Clear and Dark WebThis guest post was contributed by Mark MacDonald, Flare Curating the detection of threat exposures across the clear and dark web can...