Laden...
The day's top cybersecurity news and in-depth coverage
June 03, 2021
As two-factor authentication becomes more widespread, criminals seek novel ways to subvert it. Here's what you need to know. Read more â¶
Recent high-profile security incidents have tightened requirements to qualify for cyber insurance. These are the tougher questions insurance carriers are now asking.
The cybersecurity market is hot, and vendors are buying competitors to solidify their position or acquiring other firms to expand their offerings.
A phishing kit is the back-end to a phishing attack. It's the final step in most cases, where the criminal has replicated a known brand or organization.
By merging data from multiple sources, cybercriminals can build profiles of hacked account owners to enable other attacks or increase the effectiveness of social engineering campaigns.
Not all software supply chain attacks are the same. Here are the methods attackers currently use to corrupt legitimate software through third parties.
© 2024