Get in Touch
The U.S. and global protests of the killing of George Floyd are being used to spread malware according to the cybersecurity non-profit organization abuse.ch.
The...
CIA-developed hacking tools stolen in 2016 were compromised by an organizational culture of lax cybersecurity, according to an internal memo.
In a 2017 memo recently...
269 gigabytes of potentially sensitive data collected from more than 200 police departments across the country were leaked online last week.
The data, called “BlueLeaks,”...
Phony contact-tracing apps meant to mitigate the spread of the Covid-19 pandemic are installing ransomware on mobile devices.
One app billed itself, “The Covid-19 Tracer...
We're not even halfway through 2020, and already it's been a record-breaking year for ransomware attacks. Barely a week goes by without reports of a new strain or variant...
There is no overestimating the value of your company's domain name. Whether you work for a big brand or run a mom-and-pop dot-com, the goal...
The NSA has issued a cybersecurity advisory about the use of location data on personal devices, social media accounts, mobile applications, as well as...
Simple spelling errors in URLs can expose you to phishing, malware, and other kinds of cyber trickery. In the latest episode of Third Certainty,...
The FBI warned in a private industry notification published August 3 that companies and organizations still using Windows 7 are at risk.
Microsoft’s end of...
Cybercriminals are increasingly registering email addresses with legitimate services and using them in the commission of business email compromise (BEC) attacks.
A recent study of...