Does Your Help Desk Know Who’s Calling?
Phishing, the theft of users’ credentials or sensitive data using social engineering, has been a significant threat since the early…
Phishing, the theft of users’ credentials or sensitive data using social engineering, has been a significant threat since the early…
Iranian state-sponsored actors are continuing to engage in social engineering campaigns targeting researchers by impersonating a U.S. think tank. “Notably…
A threat actor tracked as 8220 Gang has been spotted using a new crypter called ScrubCrypt in cryptojacking campaigns. Fortinet…
Russia continues its disinformation campaign around the Ukraine war through advanced social engineering tactics delivered by the TA499 threat group.…
Cybersecurity Scenario and Strategy Planning is a good way for organisations to get ready for possible security breaches and cyberattacks.…
It’s official, Imperva has joined the EnterpriseDB (EDB) GlobalConnect Technology Partner Program. While Imperva has supported and protected the EDB…
The initial public draft of NIST AI 100-2 (2003 edition), Adversarial Machine Learning: A Taxonomy and Terminology of Attacks and…
Over the past year, the Lazarus Group has used flaws in an undisclosed software to breach a financial business entity…
Threat actors breached the DC Health Link network, the healthcare administrator that serves the U.S. House of Representatives. Researchers say…
In the latest move by the Biden administration to strengthen cybersecurity protections for critical infrastructure operators, the Transportation Security Administration…