This attack sent approximately 120,000 phishing emails to organizations worldwide with the goal to steal Microsoft 365 credentials. Image: ronstik/Adobe...more


This attack sent approximately 120,000 phishing emails to organizations worldwide with the goal to steal Microsoft 365 credentials. Image: ronstik/Adobe...more

As attackers focus on political ends, big payouts, threat hunters need to focus on identity intrusions, access merchants and tactics...more

Qualys report looks at how misconfiguration issues on cloud service providers help attackers gain access. Image: ArtemisDiana/Adobe Stock Cloud misconfiguration...more

Discover the new shadow IT guidance published by the U.K.'s NCSC. Use this guide to better identify and reduce the...more

In alliance with Cohesity and others, Cisco is fueling near-zero latency between ransomware detection and remediation with its Extended Detection...more

Cloud Security Posture Management tools are automated security solutions designed to continuously monitor and assess cloud infrastructures, services and applications...more

YubiKey 5 Series multi-protocol hardware authentication device. (Image: Yubico) Derek Hanson, an expert on hardware-bound and syncable passkeys, works very...more

IBM Security also provided tips for how to prevent and mitigate data breaches. Image: Adobe Stock Data breach costs rose...more

Discover how HealthEdge deals with security and data privacy in the face of rapid expansion. The healthcare sector is under...more

How snapshots — point-in-time copies of data — can improve data security. Image: Dilok/Adobe Stock Teams responsible for developing scalable...more