top of page

Nov 6, 2024
The Human Element: How to Strengthen Your Email Security Through Awareness and Protection
Discover how Proofpoint's insights can transform your email security approach! Join our upcoming webinar to reduce human-targeted risks!

Nov 5, 2024
Confessions from a Firewall Vendor: under Pressure
A firewall vendor report reveals increasingly skilled attackers are focused on exploiting zero-day vulnerabilities in firewall devices.

Oct 29, 2024
Trend Micro Vision One - Integrating Proactive and Reactive Cybersecurity
Vision One integrates protection and telemetry from IT/OT elements combined with risk management within a platform approach.

Oct 14, 2024
Mass Exploitation of Internet Facing Services - This Time Zimbra
A recent massively exploited vulnerability in Zimbra will give attackers another powerful tool to further amplify phishing and BEC attacks.

Oct 8, 2024
Active Directory Advice from Down Under: Is It Too Difficult and Costly to Protect It?
Protecting Active Directory is costly, complex, and crucial. Learn why AD's broad attack surface makes it a top target for ransomware.

Oct 1, 2024
Password Rotation, Complexity Requirements, or Security Questions – All Bad Practices?
NIST advises against password rotation, complexity rules, and security questions. Focus on password length for better security.

Sep 27, 2024
Identity Compromise Drives Majority of Cyber Incidents - CISA’s 2023 Findings
Attackers aren't breaking in—they're logging in. CISA's 2023 report shows 41% of breaches stem from compromised valid accounts.

Aug 27, 2024
Impersonating Government Agencies To Deliver Infostealers - The HZZO Example
A Croatia-based agency name is spoofed to deliver malware. What if these attacks get more sophisticated, and what can be done in the future?

Jun 28, 2024
Cybersecurity Incidents Are Intensifying – A Regional Example
Ransomware attacks are intensifying in the Adriatic region, revealing the vulnerabilities of complex self-hosted IT infrastructure.
bottom of page