The study shows attackers are using more bots and doing more sophisticated phishing exploits and server attacks, especially targeting retail. Image: Sashkin/Adobe Stock Attacks on commerce are booming, according to a new... Read more »
Read the technical details about a new AiTM phishing attack combined with a BEC campaign as revealed by Microsoft, and learn how to mitigate this threat. Image: MASHKA/Adobe Stock A report from... Read more »
The assumptions a business shouldn’t make about its DDoS defenses and the steps it should take now to reduce its likelihood of attack. Image: iStockphoto/stevanovicigor Jump to: A website without high traffic... Read more »
Image: Cisco Organizations worldwide are dealing with short-staffed security operations, and a security parasol that stitches together numerous single-point solutions and hampers threat visibility. At its LIVE 2023 event in Las Vegas... Read more »
In Verizon’s just-released 2023 Data Breach Investigations Report, money is king, and denial of service and social engineering still hold sway. Image: Ar_TH /Adobe Stock Verizon’s just-released 2023 Data Breach Investigations Report... Read more »
Image: faithie/Adobe Stock Google validated the virtues of passkey authentication technology on Monday with an open beta version of passkey access that allows people and organizations around the world to sign into... Read more »
Image: PhotoGranary/Adobe Stock When cloud computing first became popular, it was seen as a way of reducing both friction and costs. It was much faster and cheaper to spin up a virtual... Read more »
Identity management company 1Password is spinning up a pair of new features that constitute a major shift away from passwords and toward their low-friction replacement: passkeys. Image: 1Password On June 6, 1Password... Read more »
A new study by Okta finds that a proliferation of active accounts and web identities is exacerbating security risks both for individuals and enterprises. Image: Bussarin/Adobe Stock Many individuals do not know... Read more »
Researchers at Akamai’s Security Intelligence unit find a botnet specimen that reveals how successful DDoS, spam and other cyberattacks can be done with little finesse, knowledge or savvy. Image: iStock/bagotaj Botnets, especially... Read more »