Spear phishing 101: what you need to know - We look at the threat of spear phishing, why it's such a problem, and what organizations can do to lessen the chance of a successful attack.
Explained: the strengths and weaknesses of the Zero Trust model - Zero Trust is an information security framework that insists its users
A week in security (January 20 – 26) - A roundup of the previous week’s most notable security stories and events, including tech support scams, deepfakes, and the latest ransomware attack in Florida.
Tampa Bay Times hit with Ryuk ransomware attack - Florida newspaper The Tampa Bay Times suffered a Ryuk ransomware attack Thursday, making it the latest major victim of the notorious ransomware family that continues to rise in popularity.
Deepfakes laws and proposals flood US - In a rare example of legislative haste, roughly one dozen state and federal bills were introduced in the past 12 months to regulate deepfakes, the relatively modern technology that some fear could upend democracy.
WOOF locker: Unmasking the browser locker behind a stealthy tech support scam operation - We reveal the inner workings of WOOF locker, the most sophisticated browser locker campaign we've seen to date. Learn how this tech support scam evades researchers and ensnares users by hiding in plain sight.
A week in security (January 13 – 19) - Our weekly security roundup for January 13-19, with a look at elastic servers, data enrichment, rootkits, regulation for deepfakes, and more.
Business in the front, party in the back: backdoors in elastic servers expose private data - It's all too easy to discover data leaks online, especially in cloud services. We take a look at misconfigurations in elastic servers that lead to exposed data on the Internet.
Explained: data enrichment - Data enrichment applies to the process of enhancing, refining, and improving raw data. Used by companies to improve marketing efforts, data enrichment impacts both privacy and security.

Select your language