What You Need To Know About OAuth Phishing Attacks Amnesty International has reported that OAuth Phishing attacks targeted dozens of Egyptian human r...
Keep ReadingPhishing scams — and, increasingly, spear-phishing scams — are the number one way that cyber hackers gain access to closed computer systems, ste...
Keep ReadingThere are everyday warriors in businesses across the country, but these individuals may never have worn the uniform of their country. This next gener...
Keep ReadingOrganizations across the country are learning from cyber attacks perpetrated in Atlanta, Newark, and Sarasota. Similarly, large targets such as San ...
Keep ReadingEvery business should have a comprehensive cybersecurity plan and a competent team that can execute that plan. Otherwise, cybercriminals and malicious...
Keep ReadingCyber security is more important than ever before. The news is full of stories of leaks and breaches large and small. Some of these result from sophi...
Keep ReadingOn May 17, 2019, security firm Tenable announced that one of its researchers, David Wells, had discovered a Slack bug affecting Slack’s Windows ...
Keep ReadingHaving the right cybersecurity technology is just a part of doing business in today’s world. In fact, security solutions like firewalls and antiv...
Keep ReadingThe security of user data is of high importance, and that importance only grew with the implementation of the EU’s General Data Protection Regulati...
Keep ReadingDo you still surf the Web with Internet Explorer? If so, you’re not alone. Even after Microsoft came out with their new Edge browser in 2015, som...
Keep ReadingFor several years now, sporadic attacks that interrupt major networks’ daily programming have been occurring around the world as hackers try to bre...
Keep ReadingThe Tallahassee Democrat reported on April 5th that a large sum of money had been stolen from the city of Tallahassee’s employee payroll. The p...
Keep Reading