"CyberHoot has been a game-changer for us - simple to deploy, highly effective in raising awareness, and a great fit for MSPs looking to strengthen client security postures without adding complexity."
Bluejacking is the unauthorized sending of messages from one Bluetooth device to another. Bluetooth is...
Read moreThe United States' largest pipeline, Colonial Pipeline, halted operations due to a ransomware attack. Colonial...
Read moreMay 4th, 2021: Apple has released IOS updates for 4 critical issues that impact all Mac, iOS, iPad, and...
Read moreSecurity researchers in Germany have put out a press release about research findings to be presented at...
Read moreIt's apparent that ransomware and its evolution into leakware is a critical threat to most businesses...
Read moreThreat Intelligence (TI) is information about current attack tactics and techniques (T&T) used by...
Read moreThreat Hunting is proactive hunting or searching through networks, endpoints, and datasets to find...
Read moreThe International Traffic in Arms Regulations (ITAR) is United States regulation that controls the...
Read moreThird-Party Risk Management (TPRM) is the process of identifying, assessing, and controlling risks...
Read moreGet sharper eyes on human risks, with the positive approach that beats traditional phish testing.