Browsing Category
Cybersecurity
Phishing: How To Improve Cybersecurity Awareness
By Jason Stirland, CTO at DeltaNet International
According to research by Proofpoint, 75% of organizations around the world…
Getting Started with Active Directory Security
Evaluating, Benchmarking and Creating a Strategy
By Justin Kohler, Director of BloodHound Enterprise, SpecterOps
Over 90% of…
Cyber-Attack on New Mexico County
A cyber-attack has forced the government of New Mexico's most populous county to close most of its county buildings to the public.…
Cerberus Sentinel Acquires True Digital Security
Cerberus Cyber Sentinel Corporation today announced its acquisition of an American cybersecurity operations and compliance…
Monsanto Employee Stole Trade Secret
A man who worked at the Monsanto Company has admitted stealing a trade secret from his former employer and attempting to sell it…
How To Thwart Fraud with Phone Numbers
By Guillaume Bourcy, Vice President, Data & Identity Solutions, TeleSign
During the peak of the global pandemic, online…
Surviving The New Era of Terabit-Class DDoS Attacks
By Richard Hummel, Threat Intelligence Lead, NETSCOUTy
In March 2018, a massive Distributed Denial of Service (DDoS)…
Election Fraud Firm Shuts Down After Claims Debunked
A controversial ‘cybersecurity consultancy’ has said it’s closing after its report into alleged election fraud in Arizona was…
Thousands of Schools Impacted After IT Provider Hit by Ransomware
A leading provider of school website infrastructure has been hit by a ransomware attack, potentially disrupting thousands of…
Researchers Warn of New Log4Shell-Like Java Vulnerability
Security researchers are warning of a critical new Java bug with the same root cause as the notorious Log4Shell vulnerability …