Six security features all enterprise email requires
Email is a flexible and dependable communication solution that is easy to use, but it is often preyed upon by threat actors. Cybercriminals of all…
Email is a flexible and dependable communication solution that is easy to use, but it is often preyed upon by threat actors. Cybercriminals of all…
It has been revealed that an NPM-based supply-chain attack that dates back to December last year employed multiple malevolent NPM modules that contained hidden JavaScript…
Recent reports form the BBC have detailed that social media accounts belonging the British Army were hijacked by threat operators and abused to promote cryptocurrency…
Credential theft is a common malicious activity of modern threat operators. Using tactics like social engineering, spoof attacks and phishing emails, operators create cunning ploys…
Raccoon Stealer, a type of malware designed to illegally obtain passwords, has come back with a vengeance. The malware has returned on hacker forums within…
Email can be a useful communication tool for firms, allowing them to keep in contact with suppliers, customers, colleagues, and contacts quickly. It can also…
A phishing gang that was behind a lethal campaign of attacks that earned them millions was recently broken up by the combined efforts of European…
Electronic or e-signatures have been in use for many years but have seen increased adoption since 2020. To remain resilient during the pandemic, many companies…
Ransomware attacks have become so lucrative that many cybercriminals are changing their old ways in favour of this extortion-based cyberthreat. Ransomware gangs are not necessarily…
Handling sensitive data is an essential process for most companies in operation today. Common confidential information can include staff records and client profiles stuffed with…