Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Risks of Using Public Wi-Fi for Crypto Transactions

As cryptocurrency adoption continues to rise, the ease of managing assets through mobile wallets and trading platforms has brought a new layer of convenience. However, this accessibility can also lead to overlooked security risks, especially when users rely on public Wi-Fi networks for transactions. Airports, coffee shops, hotels, and public transportation hubs may offer free internet access, but these networks present significant vulnerabilities that can expose sensitive information.

A Subtle Form of Siege: DDoS Smokescreens as a Cover for Quiet Data Breaches

DDoS attacks have long been dismissed as blunt instruments, favored by script kiddies and hacktivists for their ability to overwhelm and disrupt. But in today's fragmented, hybrid-cloud environments, they've evolved into something far more cunning: a smokescreen. What looks like digital vandalism may actually be a coordinated diversion, engineered to distract defenders from deeper breaches in progress.

What is The Damage of a Cyber Attack? Marks & Spencers Breach Review

When dealing with a cyber attack, the specter of a cyber attack looms large over corporations, with potential repercussions that can ravage both finances and consumer trust. The recent assault on retail giant Marks & Spencer by the notorious hacking group Scattered Spider demonstrates the profound vulnerabilities at stake. Understanding the breadth of such a cyber attack is crucial not only for recovering affected businesses but also for safeguarding future operations.

You Are Still Vulnerable to Password Attacks When Using Passkeys

Just because you’re using a passkey doesn’t mean your password is gone. Microsoft is going passwordless in a new big push. As part of that new initiative, they are strongly pushing FIDO passkeys. I am a big fan of FIDO passkeys and FIDO in general. FIDO authentication offerings, including passkeys, are phishing-resistant, which makes them a HUGE improvement over passwords and most other multi-factor authentication products.

Decoding Fidelis Deception Technology to Outsmart Attackers with Fidelis Elevate

In today’s digital battlefield, attackers aren’t just breaking in—they’re sneaking past defenses, staying hidden, and making off with sensitive data long before anyone notices. While organizations invest in firewalls, antivirus tools, and endpoint protection, attackers are becoming smarter, faster, and harder to detect. We need detection that’s not only quick but also intelligent and proactive.

DDoS Attacks Up 358%: Early 2025 Breakdown with Omer Yoachimik

In this week’s episode, we talk about DDoS attacks and their sharp rise in recent months. We also start with a quick look at some Internet trends tied to the announcement of the new pope. To guide us through the world of distributed denial-of-service (DDoS) attacks, host João Tomé is joined by our DDoS expert, Omer Yoachimik.

What Is Pretexting? Definition and Examples

Pretexting is a fictional story threat actors use to trick you into giving them access to sensitive information. It is a popular scam that can happen online or in person, and it uses common phishing techniques to help threat actors achieve success in their pretexting scam. In this article, we cover: what is pretexting, how it works, examples of pretexting, and how to prevent it by subscribing to Internxt Drive and by increasing your cyberawareness online. Ready to learn more? Then keep reading!

Human-Directed Threats: The New Frontline in Cybersecurity

A constantly shifting threat landscape has given rise to a new cyberattack vector, driven by two powerful forces: the rapid migration of data to the cloud and the fundamental change in how employees access and interact with that data. Today’s workforce expects the freedom to work and access information from any device—especially mobile devices, which have become integral to their professional and personal lives.

What Is a Supply Chain Attack?

A supply chain attack does not start with your firewall. It starts with someone else’s. Instead of targeting your company directly, a cyber attacker looks for weak spots in your organization’s supply chain. That could be a trusted third-party vendor, a widely used software supplier, or even an outdated package from an open-source code repository. Once they find an opening, they exploit security vulnerabilities to gain access to your systems without ever going through the front door.