In our 2020 edition of the Phishing and Fraud Report, we focus on how cybercriminals build and host phishing sites, the tactics they use to avoid detection, and how they’ve capitalized this year on the COVID-19 pandemic.
In our 2020 edition of the Phishing and Fraud Report, we focus on how cybercriminals build and host phishing sites, the tactics they use to avoid detection, and how they’ve capitalized this year on the COVID-19 pandemic.
"What is phishing" is still a relevant question we're answering as the attack type and techniques evolve, victimizing even the most tech-savvy users.
The sheer scale of cybercrime attacks makes automated defenses a necessity. Shape's Shuman Ghosemajumder writes for VentureBeat, describing how the bad guys are also embracing automation, and what we can do about it.
The sheer scale of cybercrime attacks makes automated defenses a necessity. Shape's Shuman Ghosemajumder writes for VentureBeat, describing how the bad guys are also embracing automation, and what we can do about it.
Ransomware now includes data leakage, stealth, attack delay, anti-security, and ransomware as a service. CI Security’s John-Luke Peck shares his thoughts.
Ransomware now includes data leakage, stealth, attack delay, anti-security, and ransomware as a service. CI Security’s John-Luke Peck shares his thoughts.
Healthcare dramatically adjusted due to the COVID-19 pandemic. But parents around the world are much more concerned with education. F5 Labs' Preston Hogue writes for SecurityWeek, describing how the traditional classroom was turned on its head in a matter of weeks, and which of those changes will be...