J2 Software, SlashNext highlight AI’s role in combating BEC and advanced phishing attacksIssued by J2 SoftwareJohannesburg, 22 Jan 2025Visit our press officeJohn McLoughlin, CEO of J2 Software. J2 ...
How to protect your business in 2025By Ross Anderson, Business Unit Manager at Duxbury NetworkingIssued by Duxbury NetworkingJohannesburg, 22 Jan 2025Visit our press officeRoss Anderson, Business Unit ...
The FBI has issued a new warning about scammers targeting your email in more sophisticated ways. The FBI wants the public to be aware of scammers trying to exploit mass casualty events and disasters, ...
Security professionals can remind employees to avoid interacting with suspicious emails, including those that sound urgent or ...
Sophisticated phishing and business email compromise campaigns are increasingly targeting organisations across the ...
Yubico, the leading provider of hardware authentication security keys, worked with T-Mobile US to deploy over 200,000 FIDO2 ...
Seven years after a cyber attack cost her North Carolina school district $1.3 million, a retired CTO shared stories and tips ...
Yubico (NASDAQ STOCKHOLM: YUBICO), the leading provider of hardware authentication security keys, worked with T-Mobile US to deploy over 200,000 FIDO2 ...
Entrust IDaaS now includes AI-driven biometrics, phishing-resistant passwordless multi-factor authentication (MFA), adaptive ...
Malicious URLs are among the most common vectors for cyberattacks, enabling phishing, malware distribution, and data theft.
It’s time to recognize that cybersecurity is not just an IT issue—it’s an educational and institutional priority.
SecurityWeek's Cyber Insights 2025 examines expert opinions to gain their opinions on what to expect in Attack Surface ...