Cyber Security ICYMI: A Microsoft Warning, Follina, Atlassian, and More Jul 1, 2022 darkreading.com Dark Reading's digest of the other don't-miss stories of the week, including YouTube account takeovers and a sad commentary on…
Cyber Security Cracking the Email Security Code: 12 Best Practices for Small and Midsize Businesses Jun 8, 2022 darkreading.com It only takes one successful attack to spell disaster for a company. Learn how to protect your company with this…
Technology Pixiv, DeviantArt artists hit by NFT job offers pushing malware May 4, 2022 bleepingcomputer.com Users on Pixiv, DeviantArt, and other creator-oriented online platforms report receiving multiple messages from people claiming to be from the…
Cyber Security Double-Your-Crypto Scams Share Crypto Scam Host Apr 11, 2022 krebsonsecurity.com Online scams that try to separate the unwary from their cryptocurrency are a dime a dozen, but a great many…
Cyber Security News The Seven Deadly Sins of Blockchain Security Apr 7, 2022 cyberdefensemagazine.com By Professor Ronghui Gu, Co-Founder, CertiK Blockchain is, at heart, a security technology. Distributed Ledger Technology (DLT) is […] The…
Technology EU draft law adds security checks to all crypto transactions Apr 1, 2022 bleepingcomputer.com The European Parliament has taken the first steps for new legislation against money-laundering that covers cryptocurrency transactions, which are an…
Cyber Security Ransomware: Should Companies Ever Pay Up? Mar 31, 2022 darkreading.com Ransomware is a major threat, and no business is "too small to target." So what should you do after an…
Technology $620 million in crypto stolen from Axie Infinity’s Ronin bridge Mar 29, 2022 bleepingcomputer.com A hacker has stolen almost $620 million in Ethereum and USDC tokens from Axie Infinity's Ronin network bridge, making it…
Cyber Security For MSPs, Next-Gen Email Security Is a Must Mar 24, 2022 darkreading.com Stay one step ahead of the constantly evolving cyber threats with the right MSP email security solution. Discover how to…
Cyber Security Technology The Safest Ways for Bitcoin Trading Mar 6, 2022 cyberdefensemagazine.com By Robert Wilson, Freelancer During the year 2021, we experienced history in the cryptocurrency niche with the 3rd […] The…
ICYMI: A Microsoft Warning, Follina, Atlassian, and More
Dark Reading's digest of the other don't-miss stories of the week, including YouTube account takeovers and a sad commentary on…
Cracking the Email Security Code: 12 Best Practices for Small and Midsize Businesses
It only takes one successful attack to spell disaster for a company. Learn how to protect your company with this…
Pixiv, DeviantArt artists hit by NFT job offers pushing malware
Users on Pixiv, DeviantArt, and other creator-oriented online platforms report receiving multiple messages from people claiming to be from the…
Double-Your-Crypto Scams Share Crypto Scam Host
Online scams that try to separate the unwary from their cryptocurrency are a dime a dozen, but a great many…
The Seven Deadly Sins of Blockchain Security
By Professor Ronghui Gu, Co-Founder, CertiK Blockchain is, at heart, a security technology. Distributed Ledger Technology (DLT) is […] The…
EU draft law adds security checks to all crypto transactions
The European Parliament has taken the first steps for new legislation against money-laundering that covers cryptocurrency transactions, which are an…
Ransomware: Should Companies Ever Pay Up?
Ransomware is a major threat, and no business is "too small to target." So what should you do after an…
$620 million in crypto stolen from Axie Infinity’s Ronin bridge
A hacker has stolen almost $620 million in Ethereum and USDC tokens from Axie Infinity's Ronin network bridge, making it…
For MSPs, Next-Gen Email Security Is a Must
Stay one step ahead of the constantly evolving cyber threats with the right MSP email security solution. Discover how to…
The Safest Ways for Bitcoin Trading
By Robert Wilson, Freelancer During the year 2021, we experienced history in the cryptocurrency niche with the 3rd […] The…