The security industry does a thorough job of conveying the latest cybersecurity news, albeit sometimes to the detriment of the people whose job it is to set security priorities.
When it comes to social engineering training, make sure every employee learns the names of specific attacks.
Fraudsters are abusing a Google Calendar feature that's commonly enabled on smartphones to target unsuspecting users with scam offers.
A new extortion scam uses the threat of reputational damage to persuade website owners to pay a ransom fee.
High-risk, low-noise lateral movement attacks are becoming more common, and organizations need to adapt their strategic, tactical and operational defenses.
Researchers discovered a phishing scam that leverages a fake list of undelivered emails to trick users into clicking and offering up their login credentials.
I will never watch "The Little Mermaid" again without thinking about ransomware and cyberattacks.
Recent variants of Sodinokibi accounted for scaling issues as the ransomware family steadily moves to target large enterprises.
IBM X-Force researchers report an increase in HawkEye v9 keylogger infection campaigns targeting businesses around the world.
Social engineering will always be one of the easiest ways for threat actors to get what they want. So what can enterprises do to decrease the risk?