blog-banner.jpg

Security "Bits"

Why Phishing is a Bigger Threat than Ransomware

By Jonathan Andresen  |  September 2, 2021 at 5:00 AM  | 
shutterstock_phishing

While enterprise security teams have had their hands full battling an increasing number of more sophisticated ransomware attacks, phishing attacks are on the rise with the easing of pandemic-related restrictions.

In fact, just this past week Microsoft warned of a widespread credential phishing campaign that leverages open redirector links in email communications as a vector to trick users into visiting malicious websites while effectively bypassing security software.

Read More

Bitglass Security Spotlight: Telehealth Startup Based in the United Kingdom Affected by Data Leak

By Juan Lugo  |  June 23, 2020 at 5:00 AM  | 
Newspaper Icon with News Title - Red Arrow on a Grey Background. Mass Media Concept.

Here are the top stories of recent weeks:

  • AI Chatbot Startup Based in the United Kingdom Facing Backlash After Data Leak
  • Nintendo Breach Shuts Down Portal and Affects Over 300k Accounts
  • Ransomware Threat Actors Auctioning Victim Data on the Dark Web
  • Recent Data Breach Affects National Railroad Passenger Corporation, Amtrak
  • Malicious Self-Destructing Skimmer Steals Payment Card Information
Read More

Data Games: Security Insights from the Experts

By Jacob Serpa  |  September 19, 2017 at 11:28 AM  | 

Screen Shot 2017-09-14 at 4.53.03 PM.pngFor as long as there have been computers, there have been tech-savvy users fighting one another for supremacy and data. These users can be more or less categorized into two groups - White Hat hackers and Black Hat hackers. White Hat hackers often work in corporate IT and are individuals who use their skills for ethical purposes like protecting data and whistleblowing. Black Hat hackers use their talents maliciously for personal gain and are what most people envision when they think about hackers. As they fight with one another for dominance, both sides develop an increasingly deep understanding of security-related topics.

Read More
FOLLOW US

BLOG TOPICS

see all