Google Docs Phishing Scam a Game Changer Experts expect copycats that take advantage of passive authentication from third-party applications using standards such as OAuth.
7 Steps to Fight Ransomware Perpetrators are shifting to more specific targets. This means companies must strengthen their defenses, and these strategies can help.
Netflix Incident a Sign of Increase in Cyber Extortion Campaigns Attackers using threats of data exposure and DDoS disruptions to try and extort ransoms from organizations.