SANS institute

Cybersecurity Training Agency Breached After Phishing Attack

The SANS Institute, a company that provides cybersecurity training and certification, announced that a data breach compromised the personally identifiable data of roughly 28,000...
Business Email Compromise

Hackers Are Using Legitimate Email Services for BEC Attacks

Cybercriminals are increasingly registering email addresses with legitimate services and using them in the commission of business email compromise (BEC) attacks. A recent study of...
Windows 7 EOL

Windows 7 End of Life Presents Hacking Risk, FBI Warns

The FBI warned in a private industry notification published August 3 that companies and organizations still using Windows 7 are at risk. Microsoft’s end of...
unemployment scam

Illinois Reports Over 120K Cases of Unemployment Fraud Since March

Illinois Governor J.B. Pritzker announced that state and federal officials have identified more than 120,000 cases of unemployment-related fraud and identity theft since March...

Typosquatting – Third Certainty #24

Simple spelling errors in URLs can expose you to phishing, malware, and other kinds of cyber trickery. In the latest episode of Third Certainty,...
GPS location tracking

NSA Issues Cybersecurity Advisory on Protecting Location Data

The NSA has issued a cybersecurity advisory about the use of location data on personal devices, social media accounts, mobile applications, as well as...
spear phishing

Twitter Hack Tied To Employee Spearphishing

With the arrest of 17-year-old hacker Graham Ivan Clark in Tampa, Florida and more than 30 charges later, we’re starting to get a better...

The Twitter Hack – Third Certainty #23

In the latest episode of Third Certainty, Adam Levin discusses how to protect your accounts and data in the wake of the recent Twitter...
data leak

Source Code from Microsoft, Adobe, Nintendo, and Others Leaked Online

A collection of source code from companies including General Electric, Disney, Microsoft, Motorola, Qualcomm, Adobe, Nintendo and Microsoft has been aggregated and posted online.  The...
Email dots, pluses, and burners

Burners, Dots, and Pluses: Protecting Your Email in the Post-Privacy Age

If you find your personal email account bombarded with unwanted marketing emails, there’s a good chance your account was compromised in a breach. That...