Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

94% of U.K. Businesses Aren't Adequately Prepared for AI-Driven Phishing Scams

A new report makes it clear that U.K. organizations need to do more security awareness training to ensure their employees don’t fall victim to the evolving use of AI. Here at KnowBe4, we’ve long known that AI is going to be a growing problem, with phishing attacks and the social engineering they employ far more believable and effective.

Sophisticated Phishing Campaign Attempts to Bypass SEGs

A widespread phishing campaign is attempting to steal credentials from employees working at dozens of organizations around the world, according to researchers at Group-IB. The campaign has targeted organizations across twelve industries, including government, aerospace, finance, energy, telecommunications, and fashion. “The campaign begins with phishing links crafted to mimic trusted platforms commonly used for document management and electronic signatures, such as DocuSign,” Group-IB says.

Day in the Life of a CISO: Evaluating a Plugin Vendor

It’s mid-morning, and I’m making good progress when an email from a department head pops into my inbox. They’re thrilled about a new plugin that promises to streamline workflows for one of our most critical platforms. Naturally, they need me to sign off on the vendor’s security posture before they can move forward. I get it—business efficiency is important, but so is ensuring we don’t invite unnecessary risk into our environment.

Difference Between Supply Chain Detection & Response (SCDR) vs. Managed Detection and Response Services (MDR)

In today’s cybersecurity landscape, organizations face an ever-growing variety of threats, many of which originate from their supply chains. Traditional cybersecurity measures like Managed Detection and Response (MDR) have been widely adopted, but newer, more advanced approaches like Supply Chain Detection and Response (SCDR) are redefining how businesses tackle external risks.

A Day in the Life of a CISO: An Employee Email Discovered in a Password Dump

The notification lands in my SecurityScorecard dashboard just as I’m wrapping up a meeting. An employee’s email address has shown up in a password dump on a dark web monitoring feed. Another day, another reminder of why cybersecurity is a full-contact sport.

IAM vs PAM: What's the Difference?

The main difference between Identity and Access Management (IAM) and Privileged Access Management (PAM) is that IAM manages who has access to which resources, while PAM secures access to sensitive information. IAM involves solely user identities, and PAM falls under the umbrella of IAM by monitoring user identities with access to privileged data. Continue reading to learn more about IAM and PAM, their key differences and when to implement them in your organization.

How Advanced Device Fingerprinting Optimizes ATO Fraud Prevention

Forget ‘billions’, fraud is now a trillion-dollar challenge according to McKinsey, with phishing, account takeovers (ATOs), and credential-based attacks driving unprecedented losses. Needless to say, this step change underlines the urgency for scam-prone enterprises to add further protective layers as part of a fraud prevention strategy that combines emerging technologies.

Integrating fuzz testing in the V-model testing process for secure software

The market of embedded computing has been growing constantly, and this trend is expected to continue in the near future. Notably, embedded systems are key components for the Internet of Things (IoT) and for Cyber Physical Systems (CPSs). In the embedded software industry, secure software development is critical. This is especially true because embedded software often involves vital industries, such as medical devices or automotive solutions.