‘Good password security includes passkeys, but they are not an all-in-one solution’
Passkeys have a marketing problem, in which they get presented as a holy grail that eliminates all forms of phishing. In reality, that story is much more nuanced; they actually only address one specific form of phishing. Even though passkeys cannot live up to the promises of the marketing stories, ... Read more
Russia-backed hackers attack Microsoft: senior leadership hacked
Russian-backed hackers managed to gain access to the mail accounts of important people within Microsoft. Microsoft itself reported this in a blog post last night. Customers need not worry about this hack, the company indicated. However, internal procedures may be tightened a bit.
The group behin... Read more
Microsoft most spoofed brand for phishing attacks
Hackers who want to carry out a phishing attack and misuse a well-known brand are most likely to use Microsoft's brand name.
That's according to research for the fourth quarter of 2023 by Check Point. The brand name was used in 33 per cent of the total number of (email) phishing attacks during ... Read more
New form of phishing: What is quishing and why is it dangerous?
Phishing is a technique that is still commonly used by hackers even though the attack is years old. Small changes to the technique breathe new life into the phishing scheme each time. This mainly involves changing the medium. Whereas phishing was traditionally spread via email, hackers later switch... Read more
Atos can possibly sell cybersecurity division to Airbus
Atos plans to divest and sell its big data and cybersecurity business. One possible candidate buyer is aircraft manufacturer Airbus, according to a recent market update from the company.
Atos has been restructuring its operations and trying to split up the company for the past two years. This is... Read more
HPE Aruba is working on “Aruba Central Next Gen”: what is that?
Aruba Central needs to become more and more capable, but also more and more user-friendly. This creates a lot of work behind the scenes at HPE Aruba Networking. We discuss recent developments with EMEA CTO and Vice President of Systems Engineering, Dobias van Ingen. What do these developments mean ... Read more
“Darktrace has no competition, only partnerships”
Cybersecurity needs to get smarter. AI plays an important role in this. At Darktrace, they are tackling this challenge in their very own way, we hear from the company. How exactly? You can read about that in this article.
The quote in the title pretty much sums up how Darktrace sees itself. It c... Read more
Behind the scenes of cybersecurity: threat intelligence at Visma
What does threat intelligence look like in practice? Why is it important? We look for answers with Visma.
Threat intelligence is one of the more critical things to address as a business within your cybersecurity policy. It allows you to understand threats before they reach critical systems, allo... Read more
New BlackBerry CEO gets task to successfully split IoT and Cybersecurity divisions
BlackBerry recently appointed John Giamatteo as its new CEO. In addition, the security and IoT specialist has decided to call off a proposed IPO of its IoT division.
BlackBerry recently appointed John Giamatteo, the current director of the cybersecurity division of BlackBerry, as its new CEO. H... Read more
Cyber Resilience Act: manufacturers responsible for open-source code
New obligations must protect laptops, mobile applications and smart devices from online threats. A revision of the act holds the manufacturers accountable for the cybersecurity of their products. On the financial side, manufacturers also seem to be losing out.
The Cyber Resilience Act (CRA) is ... Read more