Effective Phishing Campaign Targeting European Companies and Organizations
A phishing campaign targeting European companies used fake forms made with HubSpot's Free Form Builder,…
Phishing in Disguise: How Email Security Brand Spoofing Erodes Trust
Author: Clint IlaganA secure email is an email that uses encryption and authentication to protect…
When and Where SIEM Fits in Healthcare IT Settings | Huntress
Understanding SIEM’s benefits, limitations, and best applications in a strong healthcare security stack
Fraud Funding Terrorism? The Cost of Missing Sanctioned Connections in a Globalized Fraud Ecosystem
Editor's note: The following blog post originally appeared on Levi Gundert's Substack page.IntroductionA past conversation…
LDAP Enumeration: Unveiling the Double-Edged Sword of Active Directory
Using real-world examples and offering plenty of pragmatic tips, learn how to protect your directory…
What’s New in Qualys VMDR: 2024 Edition
Let us quickly recap the features released in Qualys Vulnerability Management, Detection & Response (VMDR)…
5 million payment card details stolen in painful reminder to monitor Christmas spending
Another day, another exposed S3 bucket. This time, 5 million US credit cards and personal…
Canada’s Top Cybersecurity Threats: How Attackers Target Critical Industries
Canada’s Top Cybersecurity Threats: How Attackers Target Critical Industries As Canada experiences rapid digital growth…