Proactive Threat Hunting

What is Proactive Threat Hunting?

The process of proactively searching for cyber threats that are hiding…


Rackspace

Ransomware forces Rackspace to Stop Hosted Exchange Servers

Customers are struggling at Rackspace. The company is investigating a…


Protection in Windows 11

The New Enhanced Phishing Protection in Windows 11 Protects Your Passwords

Sometimes a convincing fake login page or app is all it takes to steal a…


Sophisticated Phishing Campaigns

Sophisticated Phishing Campaigns Using 42,000 Fake Domains by Chinese Hackers - Live Podcast

A financially driven gang in China is using the trust associated with…


WhatsApp Data

WhatsApp Data Breach Exposes 500 Million Accounts - One May Be Yours!

According to a post on a “well-known hacker community site,” about…


Cyber Security

Is This Critical Mistake Hurting Your Cyber Security?

It has never been more crucial for businesses to have a mature Cyber Security…


Cybersecurity Trends

Four Cybersecurity Trends to Track in 2023

Cybercrime is becoming more complex as technology develops. As a result,…


Data Exfiltration

What Is Data Exfiltration?

Data theft, or the illegal movement of data from a device or network is known…


Zero-Day Attacks

What are Zero-Day Attacks and What to do About Them

When security personnel aren’t aware of a software vulnerability and do…


Indicator of Attack

What exactly is an Indicator of Attack (IOA)?

Indicators of Attack (IOAs) are designed to identify an attacker’s…