Virtual kidnapping: How to see through this terrifying scam Source Cluster: We Live Security Source Node: 3070496Time Stamp: Jan 18, 2024
Skynet Ahoy? What to Expect for Next-Gen AI Security Risks Source Cluster: Dark reading Source Node: 3037761Time Stamp: Dec 28, 2023
Attackers Target Microsoft Accounts to Weaponize OAuth Apps Source Cluster: Dark reading Source Node: 3012360Time Stamp: Dec 13, 2023
Microsoft Alerts on Rising OAuth Crypto Exploitation Threats Source Cluster: Coingape Source Node: 3012012Time Stamp: Dec 13, 2023
Making Cyber Insurance Available for Small Biz, Contractors Source Cluster: Dark reading Source Node: 3005469Time Stamp: Dec 8, 2023
Law Firms & Legal Departments Singled Out for Cyberattacks Source Cluster: Dark reading Source Node: 2987278Time Stamp: Nov 30, 2023
US, Ghanda Citizens Stand Trial For Online Scams Source Cluster: Safety Detectives Source Node: 2940599Time Stamp: Oct 17, 2023
Business Email Compromise (BEC) Attack Steals $6 Million from Public School System Source Cluster: Fintextra Source Node: 2860216Time Stamp: Aug 31, 2023
Clorox Faces Significant Cybersecurity Breach, Takes Systems Offline Source Cluster: Safety Detectives Source Node: 2836046Time Stamp: Aug 18, 2023
3 Major Email Security Standards Prove Too Porous for the Task Source Cluster: Dark reading Source Node: 2824752Time Stamp: Aug 15, 2023
FraudGPT: The Alarming Rise of AI-Powered Cybercrime Tools Source Cluster: Analytics Vidhya Source Node: 2793509Time Stamp: Jul 28, 2023
Microsoft ‘Logging Tax’ Hinders Incident Response, Experts Warn Source Cluster: Dark reading Source Node: 2768856Time Stamp: Jul 17, 2023
Always Learning: How AI Prevents Data Breaches – KDnuggets Source Cluster: KDnuggets Source Node: 2746948Time Stamp: Jul 3, 2023
Cyber insurance: What is it and does my company need it? | WeLiveSecurity Source Cluster: We Live Security Source Node: 2721067Time Stamp: Jun 13, 2023
Tricks of the trade: How a cybercrime ring operated a multi‑level fraud scheme | WeLiveSecurity Source Cluster: We Live Security Source Node: 2688190Time Stamp: May 30, 2023
Travel-Themed Phishing, BEC Campaigns Get Smarter as Summer Season Arrives Source Cluster: Dark reading Source Node: 2682855Time Stamp: May 26, 2023
8 Crucial Tips to Help SMEs Guard Against Data Breaches Source Cluster: SmartData Collective Source Node: 2677602Time Stamp: May 25, 2023
BEC Campaign via Israel Spotted Targeting Large Multinational Companies Source Cluster: Dark reading Source Node: 2638897Time Stamp: May 9, 2023
Tessian Fully Integrates With M365 To Provide Threat Protection and Insider Risk Protection Source Cluster: Dark reading Source Node: 2614197Time Stamp: Apr 27, 2023
Q&A with Lee Wetherington, senior director of corporate strategy at Jack Henry Source Cluster: Bankinnovation Source Node: 2614266Time Stamp: Apr 27, 2023