Please turn on your JavaScript for this page to function normally.
BEC scams
Cybercriminals exploit volatile job market for targeted email attacks

Between July–December 2022, the median open rate for text-based business email compromise (BEC) attacks was nearly 28%, according to Abnormal Security. Business email and …

idea
Top 3 resolutions for security teams

As 2023 goals become solidified, companies need to decide how they are prioritizing cybersecurity. It’s time to focus on what organizations can prioritize. In this Help …

brain
Generative AI: A benefit and a hazard

If there’s one thing people will remember about AI advances in 2022, it’ll be the advent of sophisticated generative models: DALL.E 2, Stable Diffusion, …

find
Attackers are searching for online store backups in public folders. Can they find yours?

Too many online store administrators are storing private backups in public folders and exposing database passwords, secret API keys, administrator URLs and customer data to …

CIS
How to scale cybersecurity for your business

All businesses seek profitable growth. The issue is that growth adds complexity. Organizations need new systems and more employees to support this larger footprint, thus …

ChatGPT
ChatGPT’s potential to aid attackers puts IT pros on high alert

51% of IT professionals predict that we are less than a year away from a successful cyberattack being credited to ChatGPT, and 71% believe that foreign states are likely to …

Bill Tolson
While governments pass privacy laws, companies struggle to change

Government agencies keep making new privacy rules while end users fall victim to malpractice and scams. Bill Tolson, VP of Compliance and eDiscovery at Archive360, has spent …

analyst
Trends that impact on organizations’ 2023 security priorities

Although ransomware campaigns declined quarter over quarter in 2022, primarily due to the collapse of more experienced cybercriminal groups, IT leaders still consider them to …

The emergence of trinity attacks on APIs

When it comes to attacks against application programming interfaces (APIs), the building blocks that provide access to many of our applications, the OWASP API Top Ten is seen …

cloud complexity
Hybrid cloud storage security challenges

Companies are challenged with more complex hybrid IT environments. They are raising budgets to fend off cyberattacks and keep up as production environments continue to …

Eyes
The next cyber threat may come from within

71% of business executives worry about accidental internal staff error as one of the top threats facing their companies, almost on par with concern about outside attackers …

danger
50% of organizations have indirect relationships with 200+ breached fourth-party vendors

98 percent of organizations have vendor relationships with at least one third-party that has experienced a breach in the last two years, according to SecurityScorecard and The …

Don't miss

Cybersecurity news