Cyber Warfare in 140 Characters: Social Media Weaponized
David Patriakos's new book about cyber warfare is a fascinating read. From the back cover: "Modern warfare is a war of narratives, where bullets are fired both physically and virtually. ...
Keeping you informed. Keeping you aware.
Stay on top of the latest in human and agent security including social and prompt engineering, ransomware and phishing attacks.
Founder and Executive Chairman
Invisible placeholder
David Patriakos's new book about cyber warfare is a fascinating read. From the back cover: "Modern warfare is a war of narratives, where bullets are fired both physically and virtually. ...
A customer just sent us this: "Stu, the company who processes payments for Duke Energy’s walk in payments was hacked and as a result about 375,000 bank accounts may have been stolen. "We ...
Kon Leong at Harvard Business Review wrote an excellent article about the problem of employees exposing your organization to cyberthreats through human error. Here is a short qoute:
WIRED wrote: "A MASSIVE EFFORT to encrypt web traffic over the last few years has made green padlocks and "https" addresses increasingly common; more than half the web now uses internet ...
Our friends at Bleepingcomputer reported on something that should cause anyone concern. German security researcher Sabri Haddouche has discovered a set of vulnerabilities that he ...
I'm extremely pleased to tell you we have won a prestigious award. Frost & Sullivan is a global research and consulting firm and they recently announced that we received their 2017 ...
Scammers are pushing out fake PayPal emails that use the premise of an unverified transaction to phish for customers’ personal and financial information. With the end-of-the-year holidays ...
I have talked about this potentially extremely expensive and very disappointing "CEO fraud" or "Business Email Compromise" problem many times before. Your cybercrime policy may not ...
The NTT Security Global Threat Intelligence Center (GTIC) 2017 Q3 Threat Intelligence Report provides a glimpse inside the research conducted by NTT Security researchers over the last ...
You're always better off getting apps from reputable stores like Google Play than you are from potentially dodgy, at best unknown, third-party sites. But even Google Play isn't immune ...
Because that's where the money is. Criminals have been installing cryptocurrency miners on victim machines that turn them into sources of money. These operate without the users' ...
OK, it may be hyberbole, but since 91% of data breaches are caused by successful spear phishing attacks, it's not entirely crazy to say: "security awareness training your users or go to ...
The CyberEdge Group is an award-winning research firm that serves information security vendors and service providers. They recently surveyed 1,100 qualified IT security decision makers ...
Shipping company Clarksons has fallen victim to a major ransomware attack that could result in the exposure of private data, the company warned today. The statement continued: "Our ...
IT security vendor Anomali, released a new report showing the volume of stolen credentials of FTSE 100 employees tripled In 2017, and a whopping 77% of the FTSE 100 were exposed with an ...
The Kazakhstan-born Canadian citizen Karim Baratov (22) has pleaded guilty to massive 2014 Yahoo hack that affected three billion accounts. He admitted that he generally spearphished his ...
The Financial Times Stock Exchange 100 share index is an average of share prices in the 100 largest, most actively traded companies on the London Stock Exchange. IT security vendor ...
These three terms are often a source of confusion, especially in connection with cybercrime and where that comes from. If you think that search engines like Google (there are more!) know ...