9 in 10 CISOs Report at Least One Disruptive Cyberattack in the Last Year
A new report sheds light on whether CISOs have been the victim of a cyber attacks, if they’re every paid a ransom, their greatest cyber concerns, and much more.
More results...
A new report sheds light on whether CISOs have been the victim of a cyber attacks, if they’re every paid a ransom, their greatest cyber concerns, and much more.
As the number of reported ransomware attacks increases, new data provides a fresh look at how ready organizations are for ransomware attacks.
As increasing percentages of businesses experience cyberattacks, new data provides details on where the most organizational risk lies.
The Wall Street Journal recently published an article about using highly-emotionally charged, “controversial”, subjects in simulated phishing tests. Controversial topic examples include fake pay raises, reward gift cards, and free Taylor Swift…
A report from Trustwave notes that phishing remains one of the most popular and effective techniques for attackers to gain access to organizations.
Roborock’s online storefronts have been used for cybercrime schemes in the past, and it seems attackers are continuing to create fake online shops.
After all, the Chinese-originated robot vacuum cleaner brand only sells through resellers in G…
Credential harvesting has become a business in and of itself within the cybercrime economy. New insight from Microsoft details the types of attacks your organization should watch out for.
Even though there are new attack types for cybercriminals, they are still leveraging old-school attack vectors. Why? Because they still work.
Threat actors launched 156,000 business email compromise (BEC) attempts per day between April 2022 and April 2023, according to Microsoft’s latest Digital Defense Report. While most of these attempts go unanswered, criminals can receive massiv…
Real-time security coaching helps improve your organization’s security culture by enabling real-time coaching of your users in response to risky security behaviors.