Cyber Resilience Insights

NU ABONNEREN

Beveiliging
Microsoft Issues Windows CryptoAPI / CVE-2020-0601 Patch

In the first Patch Tuesday of 2020, Microsoft has released a new patch for a serious Wind… Read More >

In the first Patch Tuesday of 2020, Microsoft has released a new patch for a serious Windows vulnerability, CVE-2020-0601, or the Windows CryptoAPI Spoofing Vulnerability. The vulnerability has grave implications for machines running 32- or 64-bit Windows 10 operating systems, including Windows Ser… Read More >

Renatta Siewert

by Renatta Siewert

Content Manager

Posted Jan 16, 2020

Beveiliging
Tax Identify Theft is Increasing During Tax Season

With the 2020 tax season unde… Read More >

With the 2020 tax season underway, cybersecurity analysts are seeing an increase in the number of impersonation attacks… Read More >

Sarah Rollman

by Sarah Rollman

Posted Jan 20, 2020

Beveiliging
Criminals Target American Infrastructure with Phishing …

Enterprise networks thro… Read More >

Enterprise networks throughout the United States are experiencing an escalation of phishing and malware … Read More >

Sarah Rollman

by Sarah Rollman

Posted Jan 09, 2020

Beveiliging
MS Access Information Disclosure Vulnerability CVE-2019-1463

The Security Implications of an Apparent Memory Leak in the Microsoft Access Database Edi… Read More >

The Security Implications of an Apparent Memory Leak in the Microsoft Access Database Editor’s note: Thanks to Mimecast Research Labs’ Ofir Shlomo and Tal Dery for this discovery. In January 2019, Mimecast Research Labs discovered and disclosed CVE-2019-0560, a Microsoft Office produc… Read More >

Matthew Gardiner

by Matthew Gardiner

Director of Enterprise Security Campaigns

Posted Jan 07, 2020

Beveiliging
De 4 voorwaarden om uw merknaam te beschermen tegen misbruik

The increasingly digital global economy has created a “perfect storm” for cybe… Read More >

The increasingly digital global economy has created a “perfect storm” for cyber attackers. As our reliance on websites and email to interact with organizations has grown, so too has the opportunity for criminals who are increasingly preying on the trust we have in these organizations. S… Read More >

Dan Sloshberg

by Dan Sloshberg

Sr. Product Marketing Director

Posted Jan 06, 2020

Beveiliging
SECURITY CAMERA CYBER RISKS FOR KIDS & FAMILIES

Home security cameras have rec… Read More >

Home security cameras have recently fielded a spate of attacks affecting users across the U.S.; a particularly frighteni… Read More >

Kiri Addison

by Kiri Addison

Head of Data Science for Threat Intelligence and Overwatch

Posted Dec 13, 2019

Popular Posts

Older Posts

Beveiliging

Hoe hackbaar bent u? Vier manieren om uw cyberbewustzijn te verbeteren

Why data over-sharing is making you an easier phishing target We live in a world where sharing too much data – or the wrong data – is like asking to be hacked. It’s bad online security practice, particularly as phishing is on the ri…

Read More >

Beveiliging

Let op voor tekortkomingen: Hoe u cyberbewustzijn kunt aanmoedigen

Editor’s note: Elad Schulman is the co-founder and CEO of Segasec, and a speaker at the Cyber Resilience Summit in Dallas, October 28-30.  Awareness of the cyber skills gap has grown in lockstep with the gap itself in recent…

Read More >

Beveiliging

Cyber Resilience Summit: V&A met James Chappell van Digital Shadows

“I really like the concept of cyber resilience because it genuinely helps explain what businesses need to do: detect, respond, and recover in the shortest possible amount of time.”  Next week, cybersecurity experts from all around th…

Read More >

Security, Awareness Training

Why Deepfakes are Revolutionizing the World of Phishing

Since the dawn of social engineering, attack methodology has remained largely unchanged. But the rise in electronic communications and the departure from in-person interaction has changed this dynamic. BEC attacks rose in prominence, using email frau…

Read More >

categories

Read More >

Meer info

Popular Posts