What is Spear Phishing? Definition, Examples, Prevention Strategies

What is spear phishing, you ask? Long story short, it’s a phishing technique that plays on the victim’s trust or, rather his gullibility. Spear phishing attacks are surgical, while general…

What Is Lateral Movement? Lateral Movement Explained

Network Lateral Movement or lateral movement in cybersecurity refers to a technique used by hackers to progressively move from a compromised entry point to the rest of the network as…

America Urged to Prepare for Shift to Post-Quantum Cryptography

America Urged to Prepare for Shift to Post-Quantum Cryptography The Department of Homeland Security (DHS) has teamed up with the Department of Commerce’s National Institute of Standards and Technology (NIST) to release a roadmap on the…

VMware ESXi Servers Encrypted by Lightning-Fast Python Script

The little snippet of Python code strikes fast and nasty, taking less than three hours to complete a ransomware attack from initial breach to encryption. Researchers have discovered a new…

High Severity Vulnerability Patched in Access Demo Importer Plugin

WordFence –  WordFence –  Note: To receive disclosures like this in your inbox the moment they’re published, you can subscribe to our WordPress Security Mailing List. On August 9, 2021,…

#DTX2021: How to Keep Pace with the Rising Threat Landscape

#DTX2021: How to Keep Pace with the Rising Threat Landscape Strategies organizations should take to keep up with the evolution of cyber-attackers was the topic of a panel discussion during Digital…

Advanced Threat Protection in the Modern Age: An Interview with a Threat Hunter

These days, the line between our online and offline lives has become indistinguishable. Our home lives, professional work, community services, economic prosperity and even national security are all connected to…

IP Surveillance Bugs in Axis Gear Allow RCE, Data Theft

Three security vulnerabilities in Axis video products could open up the door to a bevy of different cyberattacks on businesses. Three vulnerabilities in the IP video-surveillance systems created by Axis…

Cybersecurity risk assessment: Does Your Company Need It?

Cyber security risk assessments are a framework for detecting, analyzing, and prioritizing operational risk – Let’s dig deeper into why your company needs it more than ever. What is a…

White House Dark Web Marketplace Shuts Down its Operations

The White House Dark Web Marketplace says “We are retiring!” The White House Dark Web marketplace will cease to exist as the website administrator has announced to shut down its…