Security January 24, 2024 How to Protect Children from Growing Cyber Threats 90% of children over 8 years old are already using Internet. Only 40% of parents ...
Security January 24, 2024 Pay Now or Pay Later Understanding the costly consequences of neglecting OT/ICS Cybersecurity This paper underscores the critical necessity for ...
Email Security January 23, 2024 Conditional QR Code Routing Attacks Over the summer, we saw a somewhat unexpected rise in QR-code based phishing attacks. These ...
Securing the Cloud January 22, 2024 A Step-by-Step Guide to Spotting and Preventing Frame Injections Imagine a thriving digital jungle where web-based applications are the abundant wildlife, and lurking amongst ...
Securing the Cloud January 17, 2024 Shifting Paradigms: Cloud Security in the Post-Pandemic Era ‘The new normal.’ It began as a buzzword after COVID-19 hit the world in 2020. ...
Company and Culture January 12, 2024 ThreatCloud AI Wins 2024 BIG Innovation Award The Business Intelligence Group awarded ThreatCloud AI with a 2024 BIG Innovation award. ThreatCloud AI ...
Securing the Cloud January 12, 2024 Is Open Source More Risk than Reward? Open source has become an indispensable aspect of modern software development. From the Linux operating ...
Infinity Security Operations January 11, 2024 Azure MACC Credits Gathering Dust? Use Them to Get the Best Prevention-First Security As we enter 2024, your organization may have unused MACC or Azure commit-to-consume (CtC) credits ...
Research January 10, 2024 Microsoft Returns to the Top Spot as the Most Imitated Brand in Phishing Attacks for Q4 2023 The latest Brand Phishing Report from Check Point Research sees Microsoft as the number one ...
Research January 9, 2024 December 2023’s Most Wanted Malware: The Resurgence of Qbot and FakeUpdates Researchers discovered a revival of the Qbot malware, which was detected in phishing attempts directed ...