Big Data
SecuritySurvey: Most CISOs feel their business is at risk for cyberattack
A new report from Proofpoint provides global insight into CISOs' challenges, expectations and priorities for 2023.
Cedric Pernet is a senior threat expert with a strong focus on cybercrime and cyberespionage. He currently works at Trend Micro. Prior to that position, he worked for several Computer Emergency Response Teams (CERTs) where he did threat intelligence investigations, incident response, and computer forensics. He was also a Law Enforcement Officer working on Cybercrime in France. He is the author of a paperbook in French language on cyberespionage and an influent person in the cybersecurity community.
EducationNetwork communications
Personal QuoteBruce Schneier - "If you think technology can solve your security problems, then you don’t understand the problems and you don’t understand the technology."
A new report from Proofpoint provides global insight into CISOs' challenges, expectations and priorities for 2023.
The U.K. government has released its annual Cyber Security Breaches Survey. Top cybersecurity threats, supply chain risks, incident responses and more are covered.
The U.S., Europe and Ukraine are reportedly targets in this malware threat. Learn how to protect affected Cisco routers.
Android infections are also prevalent on the dark web, according to Kaspersky. Learn how to keep your workforce safe from these mobile and BYOD security threats.
These phishing campaigns are exploiting a Zimbra vulnerability and affecting internet-facing webmail services. Learn how to protect your organization from this security threat.
Learn how IPFS is used in phishing attacks and why it’s especially tricky to remove the impacted pages, as well as how to protect from this security threat.
Google's Threat Analysis Group reported on a subset of APT43 called Archipelago and detailed how the company is trying to protect users.
Learn how to protect your organization and users from this Android banking trojan.
Microsoft has already seen millions of phishing emails sent every day by attackers using this phishing kit. Learn how to protect your business from this AitM campaign.
Learn how this cryptocurrency campaign operates and its scope. Then, get tips on protecting vulnerable Kubernetes instances from this cybersecurity threat.