Cybercriminals Set Sights on Digital Identities of Singapore Citizens
Singapore has become the latest target for cybercriminals looking to steal digital identities and exploit them for nefarious purposes.
Read the latest news about security awareness training, best practices, why you need it, and what happens when you don't have it in place.
Singapore has become the latest target for cybercriminals looking to steal digital identities and exploit them for nefarious purposes.
If you had to choose between regular cybersecurity training and simulated phishing testing, the data shows you should choose simulated phishing tests.
A crafty group of cybercriminals has been relentlessly pursuing Mexican banks, cryptocurrency platforms and other organizations in an extended campaign stretching back over two years. ...
The current landscape of artificial intelligence (AI) bears a striking resemblance to the early days of the internet. Just as the internet was once a wild, untamed frontier full of ...
Based on news cycles within cybersecurity, it's easy to fall into the trap of thinking that threats only come from certain parts of the world or that they only target specific industries. ...
Just when you thought the disinformation landscape couldn't get any worse, a new report from Democracy Reporting International in Europe reveals that popular AI chatbots have started ...
The PhishER Plus platform just got smarter with the addition of the new PhishER Plus Threat Intel feature that integrates web reputation data into the PhishER Plus console.
More than a quarter (26%) of organizations around the world provide no security awareness training for their employees, according to a survey by Hornetsecurity. The researchers found that ...
As email compromise attacks increase, analysis of tactics provides context on how organizations need to evolve their defenses.
The NIS2 Directive, also known as the Network and Information Security Directive, is a crucial piece of legislation designed to enhance cybersecurity and protect critical infrastructure ...
Check out the May updates in Compliance Plus so you can stay on top of featured compliance training content.
New insight into ransomware attacks show that cyber attacks are a top concern for organizations – with many not aware they were a victim until after the attack.
Check out the 60 new pieces of training content added in May, alongside the always fresh content update highlights, events and new features.
Threat actors are abusing cloud storage platforms to host phishing sites that can more easily evade detection by security scanners, according to researchers at Enea. Criminals are ...
This Pro-Hamas hacktivist group has updated their payload arsenal to include updated versions of their BiBi Wiper malware, and two new wiper variants.
I recently heard another heartbreaking story of students who were scammed out of financial aid by a phishing attack. We have also heard stories of employment scams and social media based ...
Attackers are exploiting Reflected Cross-Site Scripting (XSS) flaws to bypass security filters, according to a new report from Vipre. This technique allows attackers to send benign links ...
The Royal Canadian Mounted Police (RCMP) in Nova Scotia is warning of spear phishing attacks that impersonate company managers. The scammers text company employees requesting a payment to ...
New analysis of Q1’s ransomware attacks uncovers a single group responsible for the majority and discusses what makes them so successful.
One of the largest phishing-as-a-service platforms, LabHost, was severely disrupted by law enforcement in 19 countries during a year-long operation that resulted in 37 arrests.