Effective Phishing Campaign Targeting European Companies and Organizations

A phishing campaign targeting European companies used fake forms made with HubSpot's Free Form Builder,…

Phishing in Disguise: How Email Security Brand Spoofing Erodes Trust

Author: Clint IlaganA secure email is an email that uses encryption and authentication to protect…

When and Where SIEM Fits in Healthcare IT Settings | Huntress

Understanding SIEM’s benefits, limitations, and best applications in a strong healthcare security stack

Fraud Funding Terrorism? The Cost of Missing Sanctioned Connections in a Globalized Fraud Ecosystem

Editor's note: The following blog post originally appeared on Levi Gundert's Substack page.IntroductionA past conversation…

LDAP Enumeration: Unveiling the Double-Edged Sword of Active Directory

Using real-world examples and offering plenty of pragmatic tips, learn how to protect your directory…

What’s New in Qualys VMDR: 2024 Edition

Let us quickly recap the features released in Qualys Vulnerability Management, Detection & Response (VMDR)…

5 million payment card details stolen in painful reminder to monitor Christmas spending

Another day, another exposed S3 bucket. This time, 5 million US credit cards and personal…

Canada’s Top Cybersecurity Threats: How Attackers Target Critical Industries

Canada’s Top Cybersecurity Threats: How Attackers Target Critical Industries As Canada experiences rapid digital growth…