Vast USPS Delivery Phishing Campaign Sees Threat Actors Abusing Freemium Dynamic DNS and SaaS Providers

Vast USPS Delivery Phishing Campaign Sees Threat Actors Abusing Freemium Dynamic DNS and SaaS Providers

You may be familiar with the common phishing tactics like fake emails or text messages from a hacker pretending to be someone at your place of work, or maybe it’s someone pretending ...
GUEST ESSAY: Taking proactive steps to heal the planet — by reducing the impact of video streaming

GUEST ESSAY: Taking proactive steps to heal the planet — by reducing the impact of video streaming

| | Guest Blog Post, Top Stories
Most folks don’t realize that the Internet contributes more than 3.7 percent of global greenhouse gas emissions. Related: Big data can foster improved healthcare Within that, video represents over 80 percent of ...
Single sign on

Intelligent Credentialling: Single Sign-On for SafePaaS

| | Company News
Intelligent Credentialling: Single Sign-On for SafePaaSBusinesses struggle to balance convenience and security. Enter Single Sign-On for SafePaaS - a security solution that streamlines access and fortifies your organization's defense against cyber threats.Why ...
News alert: Hunters’ Team Axon discloses severe privilege escalation flaw in Google Workspace

News alert: Hunters’ Team Axon discloses severe privilege escalation flaw in Google Workspace

| | Top Stories
Boston, Mass. and Tel Aviv, Israel, Nov. 28, 2023 –A severe design flaw in Google Workspace’s domain-wide delegation feature discovered by threat hunting experts from Hunters’ Team Axon, can allow attackers to ...

2024 Cybersecurity Forecasts and Recommendations

What are the big 2024 cybersecurity factors, and what can we do about them? Our industry is in constant flux, and staying ahead of emerging threats is a continuous and labor-intensive challenge ...
GUEST ESSAY: Steps to leveraging ‘Robotic Process Automation’ (RPA) in cybersecurity

GUEST ESSAY: Steps to leveraging ‘Robotic Process Automation’ (RPA) in cybersecurity

| | Guest Blog Post, Top Stories
In cybersecurity, keeping digital threats at bay is a top priority. A new ally in this battle is robotic process automation (RPA.) This technology promises to simplify tasks, boost accuracy and quicken ...
Apple Finally Adopts RCS, AI Powered Scams Targeting the Elderly

Apple Finally Adopts RCS, AI Powered Scams Targeting the Elderly

In this episode, Tom shows off AI generated images of a “Lonely and Sad Security Awareness Manager in a Dog Pound” and the humorous outcomes. The conversation shifts to Apple’s upcoming support ...

Lace Tempest Exploits SysAid Zero-Day Flaw

In a recent revelation, SysAid, a leading IT management software provider, has unveiled a critical security threat affecting its on-premises software. The threat actor, identified as DEV-0950 or Lace Tempest by Microsoft, ...
Insights from SentinelOne's OneCon23

Insights from SentinelOne’s OneCon23

Earlier in the month I had the chance to attend OneCon, SentinelOne’s first ever customer conference in Boca Raton, Florida. This event was a pleasure to be at, not least as the ...

Anonymous Sudan DDoS Attack Cloudflare Decoded

In a recent wave of cyber disruptions, the elusive Anonymous hacker group Sudan, self-identified as Storm-1359, claimed responsibility for orchestrating a distributed denial-of-service (DDoS) attack that temporarily incapacitated Cloudflare’s website. The  Anonymous ...

Cloud Workload Resilience PulseMeter

Step 1 of 8

How do you define cloud resiliency for cloud workloads? (Select 3)(Required)