cyber Attacks

apt protectionsCofense Phishing Defense CentercoronavirusCOVID-19covid-19 cases in my areadomain spoofingEmail Attacksemail securitymicrosoft office 365PhishingProofpointsecure email gatewayssocial engineeringthreat actorsWeb Securitywho impersonationworld health organization

Top Email Protections Fail in Latest COVID-19 Phishing Campaign

An effective spoofing campaign promises users important information about new coronavirus cases in their local area, scooting past Proofpoint and Microsoft Office 356 ATPs.

Read More
apt protectionsCofense Phishing Defense CentercoronavirusCOVID-19covid-19 cases in my areadomain spoofingEmail Attacksemail securitymicrosoft office 365PhishingProofpointsecure email gatewayssocial engineeringthreat actorsWeb Securitywho impersonationworld health organization

Top Email Protections Fail in Latest COVID-19 Phishing Campaign

An effective spoofing campaign promises users important information about new coronavirus cases in their local area, scooting past Proofpoint and Microsoft Office 356 ATPs.

Read More
Critical InfrastructurecybersecurityDDoSEncryptionHackershealthcareindustrial control networksIOActiveIoTIoT securityLong Range Wide Area NetworkingLoRaWAN networksnetwork keysSmart HomeVulnerabilities

LoRaWAN Encryption Keys Easy to Crack, Jeopardizing Security of IoT Networks

New research from IOActive has found that “blindly” trusting the encryption of the widely adopted device protocol can lead to DDoS, sending of false data and other cyber attacks.

Read More

By continuing to use the site, you agree to the use of cookies. more information

The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.

Close