Everything there is to find on tag: cybersecurity.

Brand spoofing: criminals increasingly disguise themselves as local businesses
Suspicious emails usually appear to come from Microsoft or Amazon. However, criminals are becoming increasing...
Everything there is to find on tag: cybersecurity.
Suspicious emails usually appear to come from Microsoft or Amazon. However, criminals are becoming increasing...
Passkeys have a marketing problem, in which they get presented as a holy grail that eliminates all forms of p...
Russian-backed hackers managed to gain access to the mail accounts of important people within Microsoft. Micr...
Hackers who want to carry out a phishing attack and misuse a well-known brand are most likely to use Microsof...
Phishing is a technique that is still commonly used by hackers even though the attack is years old. Small cha...
Atos plans to divest and sell its big data and cybersecurity business. One possible candidate buyer is aircra...
Aruba Central needs to become more and more capable, but also more and more user-friendly. This creates a lot...
Cybersecurity needs to get smarter. AI plays an important role in this. At Darktrace, they are tackling this ...
What does threat intelligence look like in practice? Why is it important? We look for answers with Visma. ...
BlackBerry recently appointed John Giamatteo as its new CEO. In addition, the security and IoT specialist has...