Tag: cybersecurity

March 13, 2024

The Week in Breach News: 03/06/24 – 03/12/24

CISA shuts down servers after a hack, a walk-through of the pen testing process and register for the Q2 Product Innovation Webinar.

Read More
March 12, 2024

5 Easy Steps for Assessing an Organization’s Pen Testing Needs

Follow our five easy steps to determine an organization’s pen testing needs and learn how to evaluate solutions to find the perfect fit.

Read More
March 06, 2024

What Is Spoofing? How It Works, Types, Detection & Prevention

Spoofing is a deceptive tactic used by cybercriminals. Understand how it works, different types, and discover solutions that’ll help you combat these threats.

Read More

The Week in Breach News: 02/28/24 – 03/05/24

American Express suffers a supply chain data breach, 8 new training courses in BullPhish ID & the synergy of AV, EDR and Managed SOC.

Read More
February 29, 2024

What Is Cybercrime? Types, Effects & Protection Best Practices

Explore the world of cybercrime and learn effective strategies to fight back. Uncover insights on prevention, protection and securing your digital assets.

Read More
February 28, 2024

The Week in Breach News: 02/21/24 – 02/27/24

An insider snatches 79k emails from a UK council, the RCMP is plagued with cyber trouble & the top findings of network penetration tests.

Read More
AI phishing represented by a robotic face behind several conversation bubbles
February 27, 2024

Everything You Need to Know About AI Phishing Scams

Explore the dangers posed by AI phishing attacks and learn about AI-enhanced defensive tools that can help you mitigate that risk.

Read More
February 22, 2024

Common Types of Phishing Attacks

Discover the various types of phishing attack methods and learn effective strategies to safeguard against these prevalent cybersecurity threats.

Read More
February 21, 2024

The Week in Breach News: 02/14/24 – 02/20/24

A government votes to pay a ransomware gang, A German battery manufacturer is knocked offline & 8 common types of penetration testing.

Read More
February 16, 2024

What Is a Zero-Day Attack?

A zero-day attack occurs when actors exploit a software or application vulnerability that is unknown to the vendor or developer. Learn how to prevent them.

Read More

Please fill in the form below to subscribe to our blog