CISA has issued a warning about several recent successful cyberattacks against various organizations’ cloud services
It’s the new year, and a fresh Bitcoin sextortion scam email has been making rounds.
The 380 million record database. didn’t belong to Spotify itself, but instead to fraudsters who’d uploaded it.
The financial industry has come to rely on RegTech. It helps financials comply with regulations and tightens up data safety and security. But what is it exactly?
For MSPs, securing themselves from ransomware is just as much a practice in securing clients. See how to save data—and money—with these best practices.
Zero Trust is an information security framework that insists its users “never trust, always verify.” Is this the best security model for organizations today? We examine its strengths and weaknesses.
Phobos, which many believe was named after the Greek god of fear, isn’t as widespread as it was before nor is it more novel than your average ransomware. Yet, it remains a threat to consumers and businesses alike. We dive into Phobos ransomware and show users how to face their fears and protect against it.
Recently released court documents show European-based cinema chain Pathé lost a small fortune to a business email compromise (BEC) scam in March 2018. The attack cost the company $21.5 million—that’s 10 percent of its total earnings. Learn how to avoid BEC scams and keep your company in the black.
Two factor authentication (2fa) was introduced to enhance login security, but does it always work as advertised? Or can it be bypassed?