Dormant accounts are a low-hanging fruit for attackers – Help Net Security
| | | | | | | | | | | | | | | | | | |

Dormant accounts are a low-hanging fruit for attackers – Help Net Security

Successful attacks on systems no longer require zero-day exploits, as attackers now focus on compromising identities through methods such as … See all articles in Insights

High-risk users may be few, but the threat they pose is huge – Help Net Security
| | | | | | | | | | | | | | | | | | |

High-risk users may be few, but the threat they pose is huge – Help Net Security

High-risk users represent approximately 10% of the worker population and are found in every department and function of the organization, according to … See all articles in Insights

Password-based hacks have increased 74% over the last year
| | | | | | | | | | | | | | | | | | |

Password-based hacks have increased 74% over the last year

In brief: Today’s cybercriminals use a slew of methods to compromise systems, but the most tried-and-tested way is still a favorite: stealing … See all articles in Insights

Phishing attacks skyrocketing, over 1 million observed – Help Net Security
| | | | | | | | | | | | | | | | | | |

Phishing attacks skyrocketing, over 1 million observed – Help Net Security

The APWG’s Phishing Activity Trends Report reveals that in the second quarter of 2022, the APWG observed 1,097,811 total phishing attacks — the worst … See all articles in Insights

Why email is still the number one threat vector
| | | | | | | | | | | | | | | | | | |

Why email is still the number one threat vector

Companies across the world spend billions on cybersecurity, protecting their corporate networks from intrusion, hacking, malware, back-door … See all articles in Insights

SMS phishing is way too easy
| | | | | | | | | | | | | | | | | | |

SMS phishing is way too easy

Can you guess which one of these is fake? Of course not, they’re identical. How about these? If you paid close enough attention to the second message, … See all articles in Insights

Cloud Email Threats Soar 101% in a Year
| | | | | | | | | | | | | | | | | | |

Cloud Email Threats Soar 101% in a Year

The number of email-borne cyber-threats blocked by Trend Micro surged by triple digits last year, highlighting the continued risk from conventional … See all articles in Insights

Scam alert: This subject line is the most obvious sign an email is fraudulent, study reveals
| | | | | | | | | | | | | | | | | | |

Scam alert: This subject line is the most obvious sign an email is fraudulent, study reveals

If an unfamiliar email shows up in your inbox with an empty subject line, there’s a likely chance that it’s from a scammer. Malicious emails from … See all articles in Insights

This simple cyberattack is still among the most effective
| | | | | | | | | | | | | | | | | | |

This simple cyberattack is still among the most effective

Cybercriminals may be getting more sophisticated by the day, but simple HTML file distribution still remains one of the most popular tactics, new … See all articles in Insights

Your digital footprints could help hackers infiltrate computer networks
| | | | | | | | | | | | | | | | | | | |

Your digital footprints could help hackers infiltrate computer networks

When you use the internet, you leave behind a trail of data, a set of digital footprints. These include your social media activities, web browsing behavior, health information, travel patterns, location maps, information about your mobile device use, photos, audio and video. This data is collected, … See all articles in Insights