by Beck Bailey | Jun 10, 2024 | RSS
When employees leave their workspaces behind — whether that’s for the night, the weekend, a longer vacation or just a quick lunch break — they may leave behind potentially sensitive information where it can easily be accessed by unauthorized parties. Unsecured USB...
by Beck Bailey | Jun 10, 2024 | RSS
Cybersecurity researchers have spotted a phishing attack distributing the More_eggs malware by masquerading it as a resume, a technique originally detected more than two years ago. The attack, which was unsuccessful, targeted an unnamed company in the industrial...
by Beck Bailey | Jun 10, 2024 | RSS
Staying Sharp: Cybersecurity CPEs Explained Perhaps even more so than in other professional domains, cybersecurity professionals constantly face new threats. To ensure you stay on top of your game, many certification programs require earning Continuing Professional...
by Beck Bailey | Jun 10, 2024 | RSS
Endpoint detection and response software protects against a variety of threats and attacks. Learn about two of the most popular EDR options, CrowdStrike and Trellix, and how to protect your network.
by Beck Bailey | Jun 10, 2024 | RSS
Microsoft is warning about the potential abuse of Azure Service Tags by malicious actors to forge requests from a trusted service and get around firewall rules, thereby allowing them to gain unauthorized access to cloud resources. “This case does highlight an...
Recent Comments