Cybercriminals impersonate World Health Organization to distribute fake coronavirus e-book

Threat actors ramp up on coronavirus-themed campaigns, posing as the World Health Organization sending emails with fake e-book content. Instead of advice, users get compromised with malware.

Read more

A week in security (March 2 – 8)

A roundup of the previous week’s security headlines, including the introduction of a new series on child identity theft, an examination of law enforcement’s cybersecurity woes, a progress check on our stalkerware initiative, and more coronavirus scammers on the prowl.

Read more

A week in security (January 27 – February 2)

A roundup of the previous week’s most interesting security news

Read more

Securing the MSP: why they’re their own worst enemy

Behind each cyberattack on the MSP is typically a system left unpatched, asset management undone, security officer not hired, or board who sees investment in security as a cost center rather than a long-term investment.

Read more

Spear phishing 101: what you need to know

We look at the threat of spear phishing, why it’s such a problem, and what organizations can do to lessen the chance of a successful attack.

Read more

How to prevent a rootkit attack

Rootkit attacks are considered one of the most dangerous cyberthreats today. Learn what they are, how they infect systems, and how to protect against them.

Read more

Fake Elder Scrolls Online developers go phishing on PlayStation

We take a look at a pressure-filled phishing attempt sent to players of the Elder Scrolls Online video game.

Read more

Web skimmer phishes credit card data via rogue payment service platform

Threat actors combine phishing with a web skimmer to create a devious scheme designed to lift credit card data from unaware shoppers.

Read more

Labs report finds cyberthreats against healthcare increasing while security circles the drain

In this special edition of our quarterly CTNT report, we focus on the top attack methods and threats plaguing the healthcare industry over the last year, plus highlight recurring security challenges and reasons why cybercriminals target patient data.

Read more

Not us, YOU: vendor email compromise explained

Vendor email compromise (VEC) is a new cybersecurity term for a familiar practice, taken to the thousandth degree. Learn the similarities with business email compromise and how your organization can protect against them both.

Read more

Select your language