prevention
Malware on IBM Power Systems: What You Need to Know
Malware – what are the threats? Malware can come from and in a variety of attack vectors. Besides using ‘traditional’ methods of spreading malware, adversaries can leverage more sophisticated methods to turn ...
Preventing CEO Impersonation Phishing Scams
Phishing scams are hardly a new concept. In fact, the first phishing attacks date back nearly 30 years to the mid-1990s. But despite the tactic’s age, it remains incredibly popular among cybercriminals ...
What is Typosquatting? Learn how to defend against it.
Typosquatting is a form of cybersquatting or domain squatting in which the typo-squatter will register malicious website domain names that are typos or misspellings of popular websites. The post What is Typosquatting? ...
What is Database Security? Learn how to secure databases
What is Database Security? Learn about its importance, database Security threats and database security best practices. The post What is Database Security? Learn how to secure databases appeared first on Cyphere | ...
Defense in Depth – Definition & Relation to Layered Security Approach
We have covered everything you need to know about defence-in-depth strategy including its definition, importance and relation to layered security. The post Defense in Depth – Definition & Relation to Layered Security ...
What is a spoofing attack? Types of spoofing and prevention measures
Read all about basics of spoofing, types and examples of attacks and spoofing techniques, followed by prevention measures. The post What is a spoofing attack? Types of spoofing and prevention measures appeared ...
What is the NHS Data Security and Protection Toolkit?
A comprehensive guide to the NHS Data Security and Protection (DSP) Toolkit, what it is, how it works, and why you need it. The post What is the NHS Data Security and ...
ICMAD SAP Vulnerability (CVE-2022-22536) – Critical Risk
To understand Active Directory security risks and AD misconfigurations, it is important to learn AD concepts and terminologies related to it. The post ICMAD SAP Vulnerability (CVE-2022-22536) – Critical Risk appeared first ...
Webinar: Inside the REvil Ransomware – Pick Your Path
Today's ransomware actors are operating to devastating effect as evidenced by the Colonial Pipeline and JBS attacks, showing that a successful attack can disrupt any business ...
The Cybereason Advantage: Why Cybereason Was Named A Visionary in the 2021 Gartner Magic Quadrant for EPP
The Cybereason team is excited to announce that Gartner has named Cybereason a Visionary in the 2021 Gartner Magic Quadrant for Endpoint Protection Platforms. This is Cybereason’s first recognition in this influential ...