More than two million major cyberattacks hit globally last year

More than two million major cyberattacks hit globally last year

Last year saw more than two million major cyberattacks strike businesses across the world. The latest figures by the Internet Society’s Online Trust Alliance claim that these…

View More More than two million major cyberattacks hit globally last year
How Fraudulent Domains 'Hide in Plain Sight'

How Fraudulent Domains ‘Hide in Plain Sight’

Cybercriminals use new types of top-level domains, topical keywords, and targeted emails to trick victims into clicking malicious links. Domain fraud is an old cybersecurity…

View More How Fraudulent Domains ‘Hide in Plain Sight’
6 ways malware can bypass endpoint protection

6 ways malware can bypass endpoint protection

Sixty-three percent of IT security professionals say the frequency of attacks has gone up over the past 12 months, according to Ponemon’s 2018 State of Endpoint Security…

View More 6 ways malware can bypass endpoint protection
Attackers Used Red-Team, Pen-Testing Tools to Hack Wipro

Attackers Used Red-Team, Pen-Testing Tools to Hack Wipro

Breach of India-based outsourcing giant involved a remote access tool and a post-exploitation tool, according to an analysis by Flashpoint. The breach of outsourcing firm…

View More Attackers Used Red-Team, Pen-Testing Tools to Hack Wipro
New Security Warning Issued For Google's 1.5 Billion Gmail And Calendar Users

New Security Warning Issued For Google’s 1.5 Billion Gmail And Calendar Users

Google’s Gmail email service is used by upwards of 1.5 billion people. The Google Calendar app, meanwhile, has been downloaded more than a billion times…

View More New Security Warning Issued For Google’s 1.5 Billion Gmail And Calendar Users
Assume breach is for losers: These steps will stop data breaches

Assume breach is for losers: These steps will stop data breaches

“Assume breach” is the popular computer defense strategy based on the idea that your company is either already breached or could easily be breached by…

View More Assume breach is for losers: These steps will stop data breaches
Attack Simulator in Office 365

Attack Simulator in Office 365

If you are an Office 365 global administrator and your organization has Office 365 Threat Investigation and Response capabilities, you can use Attack Simulator to run…

View More Attack Simulator in Office 365
Fin7 hacking group targets more than 130 companies after leaders’ arrest

Fin7 hacking group targets more than 130 companies after leaders’ arrest

According to the company’s experts, Fin7 might have extended the number of groups operating under its umbrella; increased the sophistication of its methods; and even…

View More Fin7 hacking group targets more than 130 companies after leaders’ arrest
Avoid a Security Endgame: Learn About the Latest “Avengers” Scam

Avoid a Security Endgame: Learn About the Latest “Avengers” Scam

Marvel Studio’s $2.2 billion box-office hit “Avengers: Endgame” has quickly risen to the second-highest grossing film of all time in its first two weekends. Not…

View More Avoid a Security Endgame: Learn About the Latest “Avengers” Scam
Attackers Add a New Spin to Old Scams

Attackers Add a New Spin to Old Scams

Scammers are figuring out unique ways of abusing cloud services to make their attacks look more genuine, Netskope says. Cybercriminals have begun abusing legitimate cloud…

View More Attackers Add a New Spin to Old Scams