Phishers’ favorite brands in Q4 2021
International courier and package delivery company DHL heads the list of most imitated brands by phishers and malware peddlers in Q4 2021, according to Check Point Research. …
ServiceNow Messaging Service enables two‑way conversations between businesses and customers
ServiceNow announced ServiceNow Messaging Service to help organizations drive better service experiences from issue to resolution. Leveraging the Twilio platform, ServiceNow …
EMS announces fully managed bridge with WhatsApp, keeps an audit trail of conversation
EMS now offers a fully managed WhatsApp Bridging service (powered by Tulir’s open source mautrix-whatsapp bridge). Element gives a company a powerful end-to-end encrypted …
Amazon MemoryDB for Redis: Fast performance with sub-millisecond latency and high durability
Amazon Web Services announced the general availability of Amazon MemoryDB for Redis, a fully managed, Redis-compatible, in-memory database. Amazon MemoryDB for Redis enables …
Keysight Nemo 5G RAN Analytics software automates data processing, reporting and analytics
Keysight Technologies has launched the new Keysight Nemo 5G RAN Analytics software, a fully automated cloud-based solution for streamlining data processing, as well as …
Mitch Lowe invests in UseCrypt to offer privacy in the field of telecommunications
Mitch Lowe – co-founder senior executive of Netflix, long time president of Redbox and Moviepass, has joined UseCrypt. The official announcement took place in Monaco, …
Financial services accounting for nearly 40% of all phishing URLs
Vade released its Phishers’ Favorites report for H1 2021, which revealed that there has been a major jump in phishing attacks since the start of the year with a 281 percent …
Code42 enhances Incydr to help identify insider risk related to file uploads to unsanctioned websites
Code42 is introducing enhanced capabilities to the Code42 Incydr data risk detection and response product for identifying insider risk related to file uploads to unsanctioned …
End-to-end encrypted communication mitigates enterprise security risk and ensures compliance
It is a mathematical certainty that data is more protected by communication products that provide end-to-end encryption (E2EE). Yet, many CISOs are required to prioritize …
Mobile messengers expose billions of users to privacy attacks
Popular mobile messengers expose personal data via discovery services that allow users to find contacts based on phone numbers from their address book, according to …
Cybercriminals are using IM platforms as marketplaces
Cybercriminals are increasingly using IM platforms like Telegram, Discord, Jabber, WhatsApp, IRC and others to advertise and sell their goods and services, IntSight …
The 25 most impersonated brands in phishing attacks
PayPal remains the top brand impersonated in phishing attacks for the second quarter in a row, with Facebook taking the #2 spot and Microsoft coming in third, according to …
Featured news
Resources
Don't miss
- Fake Claude Code install pages highlight rise of “InstallFix” attacks
- Decoding silence: How deaf and hard-of-hearing pros are breaking into cybersecurity
- Turning expertise into opportunity for women in cybersecurity
- Open-source tool Sage puts a security layer between AI agents and the OS
- Iran-linked APT targets US critical sectors with new backdoors