Not us, YOU: vendor email compromise explained

Vendor email compromise (VEC) is a new cybersecurity term for a familiar practice, taken to the thousandth degree. Learn the similarities with business email compromise and how your organization can protect against them both.

Read more

TrickBot adds new trick to its arsenal: tampering with trusted texts

TrickBot’s latest feature allows it to tamper with the web sessions of users from Verizon, T-Mobile, and Sprint mobile carriers.

Read more

How gamers can protect against increasing cyberthreats

We take a look at the various cyberthreats video gamers may encounter online, their real-world consequences, and what users can do to protect themselves.

Read more

Compromising vital infrastructure: air traffic control

The aviation industry and air traffic (control) are vital elements of our infrastructure. While flying is reportedly safe, how does that landscape look cybersecurity-wise?

Read more

Select your language