identity cyberattacks ransomware

Assessing Content Management System Security

As more businesses turn paperless and strive for more efficiency, content management systems become more and more popular. But having all your sensitive information in one place can be a risk. The ...
Security Boulevard

13 Reasons Why WordPress Hacks are Successful

In the attacker’s world, all vulnerabilities and potential exploits work toward the hacker’s advantage — not yours, not mine. This includes WordPress hacks. While living back east (over a decade ago), I ...
AI cybersecurity

New Phishing Kit Allows Bypassing Two-Factor Authentication with Ease

Attackers have a new phishing tool in their arsenal, and it’s a powerful one. A penetration tester released an open source toolkit that can be used to easily set up phishing attacks ...
Security Boulevard

Secure Guardrails