Loading...
The day's top cybersecurity news and in-depth coverage
June 01, 2021
By merging data from multiple sources, cybercriminals can build profiles of hacked account owners to enable other attacks or increase the effectiveness of social engineering campaigns. Read more â¶
Discover how to best align your security awareness training program KPIs with your overall cybersecurity goals. On June 22nd, join Terranova Security, sponsor Microsoft and a line up of industry experts like Gartner for the 2021 Security Awareness Virtual Summit! Register Today!
The concept of linchpin software can be useful in assessing risk and focusing security efforts, but it comes with challenges.
The Russian state-sponsored group has shifted to targeted email attacks that exploit third-party services.
Not all software supply chain attacks are the same. Here are the methods attackers currently use to corrupt legitimate software through third parties.
HITRUST is a cybersecurity framework that seeks to unify the rules for many other existing regulatory and industry frameworks, including HIPAA, GDPR, PCI-DSS, and more.
NTLM is a less secure protocol for authenticating Windows network access. Follow these steps to begin migration off it or to limit its use.
© 2024