corporate
-
Researchers Warns of Increase in Phishing Attacks Using Decentralized IPFS Network
The decentralized file system solution known as IPFS is becoming the new “hotbed” for hosting phishing sites, researchers have warned.…
Read More » -
Google Blocks Dozens of Malicious Domains Operated by Hack-for-Hire Groups
Google’s Threat Analysis Group (TAG) on Thursday disclosed it had acted to block as many as 36 malicious domains operated…
Read More » -
What Are Shadow IDs, and How Are They Crucial in 2022?
Just before last Christmas, in a first-of-a-kind case, JPMorgan was fined $200M for employees using non-sanctioned applications for communicating about…
Read More » -
Mitigate Ransomware in a Remote-First World
Ransomware has been a thorn in the side of cybersecurity teams for years. With the move to remote and hybrid…
Read More » -
Reimagine Hybrid Work: Same CyberSec in Office and at Home
It was first the pandemic that changed the usual state of work – before, it was commuting, working in the…
Read More » -
Difference Between Agent-Based and Network-Based Internal Vulnerability Scanning
For years, the two most popular methods for internal scanning: agent-based and network-based were considered to be about equal in…
Read More » -
Hacking Scenarios: How Hackers Choose Their Victims
Enforcing the “double-extortion” technique aka pay-now-or-get-breached emerged as a head-turner last year. May 6th, 2022 is a recent example. The…
Read More » -
ExpressVPN Removes Servers in India After Refusing to Comply with Government Order
Virtual Private Network (VPN) provider ExpressVPN on Thursday announced that it’s removing Indian-based VPN servers in response to a new…
Read More » -
Researchers Demonstrate Ransomware for IoT Devices That Targets IT and OT Networks
As ransomware infections have evolved from purely encrypting data to schemes such as double and triple extortion, a new attack…
Read More »