Security Experts:

long dotted


Open redirect vulnerabilities in American Express and Snapchat were exploited in phishing attacks for months. [Read More]
Twilio has been hacked by a relentless threat actor who successfully tricked employees into giving up login credentials that were then used to steal third-party customer data. [Read More]
Convenience store chain, 7-Eleven, said that it had closed its outlets in Denmark after a suspected hacker attack knocked out their cash tills. [Read More]
Facebook’s parent company says it has taken action against two cross-platform cyberespionage networks operating out of South Asia. [Read More]
A cyberespionage operation aimed at industrial enterprises and public institutions in Russia and Ukraine has been linked to a Chinese threat actor. [Read More]
BTC-e operator Alexander Vinnik, a Russian citizen, has been extradited by Greece to the United States hours after his release from a French jail. [Read More]
Texas startup Ghost Security emerged from stealth this week with $15 million in investments from 468 Capital, DNX Ventures, and Munich Re Ventures. [Read More]
Slack has started forcing password resets for some workspace owners after the discovery of a security flaw that exposed credentials. [Read More]
Evidence suggests that a recent disruptive cyberattack aimed at the Albanian government was conducted by Iranian threat actors. [Read More]
ZeroFox will begin trading on the Nasdaq Stock Market as a result of the previously announced deal by SPAC firm L&F Acquisition Corp. [Read More]


rss icon

Joshua Goldfarb's picture
By understanding how to identify, isolate, and remove unwanted bot and fraud traffic, enterprises can remove the noise clouding the visibility they have into their online applications.
Joshua Goldfarb's picture
A healthy dose of curiosity and humility can help enterprises ask the right questions, perform the right analysis, and focus on the right topics around improving their fraud programs.
Derek Manky's picture
Organizations can strengthen their security posture by getting detailed information on current attack techniques and keeping their employees’ cyber hygiene training up to date.
Joshua Goldfarb's picture
We can learn a valuable lesson about better fraud decision-making from restaurant choosing scenarios.
Derek Manky's picture
Malware and targeted attacks on operating systems and firmware have become increasingly destructive in nature, and these more nefarious attack methods are rising in prevalence.
Galina Antova's picture
There are seven immediate steps you can take to put your organization on the path toward better situational awareness and risk reduction to protect critical infrastructure.
Landon Winkelvoss's picture
In the event of Russian cyberwarfare, reviewing the industries, styles, and objectives of their attacks can help organizations to prepare and implement more robust defenses.
Joshua Goldfarb's picture
While attackers and fraudsters are continually adapting and evolving, there are some measures that businesses can take to improve their fraud programs
Derek Manky's picture
Botnets have become a fixture in the threat landscape, and are in a state of evolution as they learn and use newer, more evolved cybercriminal attack techniques.
Derek Manky's picture
Organization must remain hyper-vigilant and upgrade their defenses as thoroughly and quickly as possible.