Businesses using Google Workspace are only half as likely to suffer a reportable cyberattack compared to companies using Microsoft 365, according to claims data...
Two cybercriminal groups well-established in the business of spreading infostealers are diversifying their capabilities, abusing code-signing certificates to spread stealer malware, and then pivoting...
Cyberthreat actors are abusing Google's Looker Studio data-visualization tool to deliver phishing-lure pages that ultimately steal both money and credentials — and skate by email defenses.Google...
Earlier this year, law enforcement officials disrupted the operations of the Hive cybercriminal group, which profited off a ransomware-as-a-service (RaaS) business model. Hive is...
Email security standards are proving porous where malicious email attacks are concerned, since attackers use a deceptive link or new domains that comply with...
Researchers have discovered hundreds of devices running on government networks that expose remote management interfaces on the open Web. Thanks to the Cybersecurity and...
Factors such as cloud computing, remote work and the IoT have dissolved the traditional network perimeter. Modern network security, therefore, requires...
Cloud email security provider Ironscales added a new arrow to its quiver: Themis Co-pilot for Microsoft Outlook, a self-service threat reporting chatbot powered by...
UPDATEDespite pushing out patches addressing vulnerabilities in its Email Security Gateway (ESG) appliances in May, today Barracuda issued an urgent warning that all affected...
Hackers are turning to obfuscation tactics relying on glossy advertising photos from Delta Airlines and retailer Kohl's, tricking users into visiting credential harvesting sites...
TEL AVIV, Israel, May 25, 2023 /PRNewswire/ -- A report published today by Perception Point, a leading provider of advanced threat prevention across digital channels, has identified...