Work-from-home and social media dominate Q4 2020 email scams. In the fourth quarter of 2020, real phishing emails that were reported to IT departments related to working from home are on the rise.
More business-process attacks, device-based attacks and identity-based deepfake attacks are headed our way, predicts a specialist firm This year, phishing kits will get trickier. Phishing continues to ...
Scammers and cybercriminals are only too happy to send you hacked premium versions of software in order to steal account credentials During the year-end gifting season, cybercriminals often cash-in on ...
Many APAC organisations are greatly concerned about external attackers, but they are not the only threats to modern organisations because insider threats are increasingly affecting cybersecurity ...
Christmas is just around the corner, and we’re all winding down for the year — making it the perfect time for cybercriminals to strike. Don’t let the Grinch steal your data! As the holiday season ...
A researcher for a cybersecurity firm that just got banned from the US market has some insights to share with readers Tensions and conflicts in the geo-political arena can lead to increased ...
Report finds email attacks surging 293%, with new ransomware groups emerging, in the first half of 2024. Acronis’ biannual report Acronis Cyberthreats Report H1 2024 has found email attacks surging ...
October marks Cybersecurity Awareness Month, and experts share how things have changed, and what we should do to protect against cyberthreats. Perhaps it’s time to change the name of this cause too?
In DevSecOps, collaboration and consistency are key. Not only in software development, but when it comes to collaboration on Git repositories, where the word “key” takes on a whole new meaning.
Beefing up the cyber workforce; helping vulnerable SMEs; establishing cyber intelligence networks through public-private-partnerships; and assimilating international cyber trends are key As the ...
The 2nd CybersecAsia Awards honors Asia Pacific’s leaders in cybersecurity for the critical roles played and the huge advances and innovations made over the last two years. With the onslaught of COVID ...
Researchers believe we could see more attacks based on such evasive, difficult-to-remove malware implants this year. As malware infections go, firmware bootkits are notoriously difficult to remove, ...