Skip to main content

News

| News
In a profit-driven, ethically-unconstrained criminal enterprise like phishing it is not surprising that threat actors have evolved to match the times. Rather than focus on techniques, this article will discuss how phishing applications have changed to match new security standards. Only 22% of Micr…
| News
There’s a super malicious insider who is technically proficient and often acutely aware of an organisation’s technical limitations in proactively detecting insider threats. This is according to Dtex System’s 2022 Insider Risk Report that is based on real investigations and data collected by the Dte…
| News
Cybersecurity is one of those topics that has been in the media and in almost every print and online publication, even in verticals that have nothing to do with cybersecurity, for years. Today it’s one of those topics that we gloss over or perhaps don’t even see unless the headline is catchy or men…
| News
Connected consumer and business products have begun flooding the market, but security remains an afterthought. Cybercriminals are always on the prowl to access smart devices like wireless security cameras, smart TVs, baby cameras, smart speakers, smartphones or tablets. The plethora of connected g…