Secure email gateways (SEGs) are meant to protect your organization and your employees from the dangers of phishing attacks. Instead, they provide a false sense of security, as phish continue to swim past these gates and land in your end user's inbox every day.
In this webinar, Cofense co-founder and CTO, Aaron...
Senator Kamala Harris of California, presumptive Democratic presidential nominee Joe Biden's pick for his vice presidential running mate, has a track record of interest in election security issues. But so far, none of her sponsored measures have won Congressional approval.
Yet another ransomware-wielding gang has threatened to steal and leak the data of any victims who refuse to pay a ransom: The operators of Avaddon ransomware have created a dedicated data-leak site that already lists a construction firm victim, and the gang continues to recruit new affiliates.
The operators behind the AgentTesla remote access Trojan have upgraded the infostealer with additional capabilities, including the ability to steal credentials from VPNs, web browsers, FTP files and email clients, Sentinel Labs reports. The low-cost malware is used in BEC scams and other campaigns.
Qualcomm is prepping patches for its Snapdragon Digital Signal Processor, used in an estimated 1 billion or more Android devices, after researchers at Check Point counted 400 flaws that attackers could exploit to take control of devices and steal all data they store.
The Domain Name System, which is at the heart of the internet, is a rich source of data that can help organizations defend themselves against cybercrime. DNS pioneer Paul Vixie says monitoring DNS traffic is crucial, and it's advisable to run your own recursive resolver.
A recently uncovered BEC scam has targeted the Office 365 accounts of executives at over 1,000 companies worldwide, collecting more than 800 sets of credentials in an attempt to commit payment fraud, according to Trend Micro.
Reddit had a very "Make America Great Again" weekend, as more than 70 subreddits were temporarily hijacked and used to post "MAGA" messages in support of U.S. President Donald Trump. Attackers claim they used social engineering and password stuffing to compromise the accounts.
Enterprise Management Associates spoke with over 250 IT and Security professionals across North America on the topic of Security Orchestration, Automation, and Response (SOAR) tools. On average, respondents identified a 48% efficiency improvement in security operations when using a SOAR tool. In fact, 97% of...
Russia, China and Iran are all seeking to influence the 2020 U.S. Presidential election in November, according to a new report from the Office of the Director of National Intelligence that offers details about each country's plans and goals.