Laden...
The day's top cybersecurity news and in-depth coverage
June 02, 2021
Recent high-profile security incidents have tightened requirements to qualify for cyber insurance. These are the tougher questions insurance carriers are now asking. Read more â¶
A phishing kit is the back-end to a phishing attack. It's the final step in most cases, where the criminal has replicated a known brand or organization.
The Russian state-sponsored group has shifted to targeted email attacks that exploit third-party services.
By merging data from multiple sources, cybercriminals can build profiles of hacked account owners to enable other attacks or increase the effectiveness of social engineering campaigns.
Not all software supply chain attacks are the same. Here are the methods attackers currently use to corrupt legitimate software through third parties.
HITRUST is a cybersecurity framework that seeks to unify the rules for many other existing regulatory and industry frameworks, including HIPAA, GDPR, PCI-DSS, and more.
© 2024