Criminals Use Deepfake Videos to Interview for Remote Work
The latest evolution in social engineering could put fraudsters in a position to commit insider threats.
The latest evolution in social engineering could put fraudsters in a position to commit insider threats.
By Dr. Torsten Saab, Principal Engineering Fellow, Raytheon The 2020 Internet Crime Report includes information from 791,790 complaints […] The…
A Chinese-speaking threat actor has hacked into the building automation systems (used to control HVAC, fire, and security functions) of…
A clever, new phishing technique uses Microsoft Edge WebView2 applications to steal victim's authentication cookies, allowing threat actors to bypass…
Don’t Overlook Lifecycle and Data Management Details By Gregory Hoffer, CEO, Coviant Software Threat actors are a relentless […] The…
By Viktoria Sokurenko, CMO of Ukrainian start-up X-ray OPSEC (Operational Security) is a term used by US intelligence […] The…
By Smit Kadakia, Chief Data Scientist, Seceon Inc. Internet of Things (IoT) and Industrial IoT (IIoT) are not […] The…
Cyber insurance is more than a policy for paying off ransomware gangs. It's designed to be something you transfer risk…
The commercial-grade surveillance software initially was used by law enforcement authorities in Italy in 2019, according to a new report.
Security pros can employ the technology to evaluate vulnerabilities and system capabilities, but they need to watch for the potential…