Can the right cybersecurity solution make Verstappen’s Red Bull go faster?
Formula 1 is all about speed. A team's cybersecurity solution must keep up with this. We spoke to Mark Hazelton, Oracle Red Bull Racing's Chief Security Officer, about the importance of cybersecurity within the team and the role Arctic Wolf plays in this regard.
Hazelton has been part of the wo... Read more
Brand spoofing: criminals increasingly disguise themselves as local businesses
Suspicious emails usually appear to come from Microsoft or Amazon. However, criminals are becoming increasingly cunning with the brands they mimic, so potential victims do not readily recognize the deception.
Mimecast looked at an overview of criminal activity through email campaigns in its Octo... Read more
‘Good password security includes passkeys, but they are not an all-in-one solution’
Passkeys have a marketing problem, in which they get presented as a holy grail that eliminates all forms of phishing. In reality, that story is much more nuanced; they actually only address one specific form of phishing. Even though passkeys cannot live up to the promises of the marketing stories, ... Read more
Russia-backed hackers attack Microsoft: senior leadership hacked
Russian-backed hackers managed to gain access to the mail accounts of important people within Microsoft. Microsoft itself reported this in a blog post last night. Customers need not worry about this hack, the company indicated. However, internal procedures may be tightened a bit.
The group behin... Read more
Microsoft most spoofed brand for phishing attacks
Hackers who want to carry out a phishing attack and misuse a well-known brand are most likely to use Microsoft's brand name.
That's according to research for the fourth quarter of 2023 by Check Point. The brand name was used in 33 per cent of the total number of (email) phishing attacks during ... Read more
New form of phishing: What is quishing and why is it dangerous?
Phishing is a technique that is still commonly used by hackers even though the attack is years old. Small changes to the technique breathe new life into the phishing scheme each time. This mainly involves changing the medium. Whereas phishing was traditionally spread via email, hackers later switch... Read more
Atos can possibly sell cybersecurity division to Airbus
Atos plans to divest and sell its big data and cybersecurity business. One possible candidate buyer is aircraft manufacturer Airbus, according to a recent market update from the company.
Atos has been restructuring its operations and trying to split up the company for the past two years. This is... Read more
HPE Aruba is working on “Aruba Central Next Gen”: what is that?
Aruba Central needs to become more and more capable, but also more and more user-friendly. This creates a lot of work behind the scenes at HPE Aruba Networking. We discuss recent developments with EMEA CTO and Vice President of Systems Engineering, Dobias van Ingen. What do these developments mean ... Read more
“Darktrace has no competition, only partnerships”
Cybersecurity needs to get smarter. AI plays an important role in this. At Darktrace, they are tackling this challenge in their very own way, we hear from the company. How exactly? You can read about that in this article.
The quote in the title pretty much sums up how Darktrace sees itself. It c... Read more
Behind the scenes of cybersecurity: threat intelligence at Visma
What does threat intelligence look like in practice? Why is it important? We look for answers with Visma.
Threat intelligence is one of the more critical things to address as a business within your cybersecurity policy. It allows you to understand threats before they reach critical systems, allo... Read more