Malware on IBM Power Systems: What You Need to Know

Malware – what are the threats? Malware can come from and in a variety of attack vectors. Besides using ‘traditional’ methods of spreading malware, adversaries can leverage more sophisticated methods to turn ...
Microsoft Teams Okta Zoom cybersecurity CEO MS teams

Preventing CEO Impersonation Phishing Scams

Phishing scams are hardly a new concept. In fact, the first phishing attacks date back nearly 30 years to the mid-1990s. But despite the tactic’s age, it remains incredibly popular among cybercriminals ...
Security Boulevard
typosquatting guide

What is Typosquatting? Learn how to defend against it.

Typosquatting is a form of cybersquatting or domain squatting in which the typo-squatter will register malicious website domain names that are typos or misspellings of popular websites. The post What is Typosquatting? ...
what is database security

What is Database Security? Learn how to secure databases

What is Database Security? Learn about its importance, database Security threats and database security best practices. The post What is Database Security? Learn how to secure databases appeared first on Cyphere | ...
Defence in depth definition and relation to layered security

Defense in Depth – Definition & Relation to Layered Security Approach

We have covered everything you need to know about defence-in-depth strategy including its definition, importance and relation to layered security. The post Defense in Depth – Definition & Relation to Layered Security ...
what is spoofing in cyber security

What is a spoofing attack? Types of spoofing and prevention measures

Read all about basics of spoofing, types and examples of attacks and spoofing techniques, followed by prevention measures. The post What is a spoofing attack? Types of spoofing and prevention measures appeared ...
What is the NHS Data Security and Protection Toolkit

What is the NHS Data Security and Protection Toolkit?

A comprehensive guide to the NHS Data Security and Protection (DSP) Toolkit, what it is, how it works, and why you need it. The post What is the NHS Data Security and ...
icmad sap vulnerability

ICMAD SAP Vulnerability (CVE-2022-22536) – Critical Risk

To understand Active Directory security risks and AD misconfigurations, it is important to learn AD concepts and terminologies related to it. The post ICMAD SAP Vulnerability (CVE-2022-22536) – Critical Risk appeared first ...
The Cybereason Advantage: Why Cybereason Was Named A Visionary in the 2021 Gartner Magic Quadrant for EPP

The Cybereason Advantage: Why Cybereason Was Named A Visionary in the 2021 Gartner Magic Quadrant for EPP

The Cybereason team is excited to announce that Gartner has named Cybereason a Visionary in the 2021 Gartner Magic Quadrant for Endpoint Protection Platforms. This is Cybereason’s first recognition in this influential ...