Detecting and preventing account takeover (ATO) attacks Matt Cochran David Coxe August 27, 2024 A strong prevention strategy is more crucial than ever to reduce risks of account takeover (ATO) attacks. Read More
Report: 63% of security practitioners experience burnout Security Staff August 26, 2024 A survey shows 63% of security practitioners experience burnout and reveals the key steps to retaining security talent. Read More
2 out of 3 major political donation sites lack critical security Security Staff August 26, 2024 As the election season draws closer, the increase in political donations may attract cyber criminals. Read More
Engineering the human out of cybersecurity Bryan Schader August 26, 2024 Cybersecurity controls must be constantly evaluated to ensure they can withstand new and upcoming threats, especially those that target employees. Read More
Top 5 ransomware groups and malware delivering ransomware in 2024 Security Staff August 23, 2024 Research reveals the 5 most prominent ransomware groups and malware delivering ransomware. Read More
90% of Americans are concerned about the rise in fraud Security Staff August 23, 2024 A survey shows that a majority of Americans are worried about an increase in fraud. Read More
Manufacturing is the most targeted sector by cyber criminals Jordyn Alger August 22, 2024 A new report details the top threat trends observed in the first half of 2024, including the most targeted industries. Read More
45% of tech leaders have experienced a SaaS cybersecurity incident Security Staff August 22, 2024 A report found that 78% of technology leaders are concerned about security threats in Software-as-a-Service for application and software development.Read More
8 vulnerabilities found in macOS operating system Microsoft apps Jordyn Alger August 22, 2024 Researchers discovered 8 vulnerabilities in macOS operating system Microsoft apps, and security leaders are sharing their insights. Read More
New research: Malicious actors are imitating tech companies Security Staff August 21, 2024 New research reveals that malicious actors are imitating tech companies in an effort to compromise corporate systems. Read More