New infosec products of the week: July 23, 2021
Stellar Cyber XDR Kill Chain allows security analyst teams to disrupt cyberattacks Stellar Cyber introduced a realistic XDR Kill Chain to serve as a new model, addressing the …
Cofense Protect MSP: Phishing protection for MSPs safeguarding SMBs
Cofense launched Cofense Protect MSP, a phishing protection solution that’s designed for managed services providers (MSPs) tasked with protecting small and medium businesses …
Cofense acquires Cyberfish to eliminate the need for legacy email security solutions
Cofense announced the acquisition of Cyberfish, provider of next-generation phishing protection powered by Computer Vision and advanced Machine Learning (ML) technology. By …
Phishers are trying to bypass Office 365 MFA via rogue apps
Phishers are trying to bypass the multi-factor authentication (MFA) protection on users’ Office 365 accounts by tricking them into granting permissions to a rogue …
What will phishers do once push-based MFA becomes widely used?
As phishing continues to be the number one method for initiating a breach, investing in anti-phishing technologies or training – preferably both – should be a …
Photo gallery: Black Hat USA 2018, part 2
Black Hat USA 2018 is underway at Las Vegas. Here are a few photos from the Business Hall. Featured companies: LogRhythm, Carbon Black, Swimlane, Qualys, Cofense, Vectra, …
New infosec products of the week: June 8, 2018
Symantec launches new features for the modern workforce Symantec announced new innovations and enhancements to its Network Security for the Cloud Generation solution, designed …
Certain types of content make for irresistible phishes
A mature anti-phishing program keeps organizations safer, claims Cofense, and offers as proof the decreasing susceptibility of their customers’ employees to mock …
Like any threat, malware evolves: Discover new trends
Cofense released the 2018 Cofense Malware Review, detailing the trends that defined malware attacks in 2017 and the emerging trends for network defenders to prioritize in …
Featured news
Sponsored
Don't miss
- Cheap ransomware for sale on dark web marketplaces is changing the way hackers operate
- Who owns customer identity?
- Enterprises face significant losses from mobile fraud
- Palo Alto firewalls: Public exploits, rising attacks, ineffective mitigation
- Thinking outside the code: How the hacker mindset drives innovation