The Story of Jericho Security
Redefining Cybersecurity for the AI Era With the launch of ChatGPT, everything changed – overnight, AI became democratized. But while…
Redefining Cybersecurity for the AI Era With the launch of ChatGPT, everything changed – overnight, AI became democratized. But while…
In a recent espionage campaign, the infamous North Korean threat group Lazarus targeted multiple organizations in the software, IT, finance, and…
Beyond Silos By Dan Cole, VP of Product Marketing, ThreatConnect We know that attackers are outpacing defenders: we’ve all heard…
First, there was phishing. The goal: To trick targets into revealing information or completing unauthorized actions. Around since the 1990s,…
The cybersecurity landscape is rapidly evolving, with Artificial Intelligence (AI) driving both innovation and risk. While AI enhances security by…
1.1 Emerging Cybersecurity Technologies As we move into 2025, AI and machine learning are expected to play an even larger…
Hackers don't break in—they log in. Credential-based attacks now fuel nearly half of all breaches. Learn how to scan your…
Introduction The evolving landscape of healthcare cybersecurity is undergoing a major transformation with the Department of Health and Human Services’…
The battle didn’t begin today, and it’s not ending anytime soon, as cyber threats are changing at a rate never…
Phishing-as-a-service (PhaaS) platform Tycoon2FA, known for bypassing multi-factor authentication on Microsoft 365 and Gmail accounts, has received updates that improve…