Vintage Vulnerabilities: New Attacks Can Exploit Old Weaknesses
Popular entertainment would have us believe that hackers are all sophisticated attackers ready to strike the latest vulnerabilities. That is sometimes true, but it’s become
Video: A Spotlight on Cybersecurity: 2022 Trends and 2023 Predictions
After years of growing in importance, cybersecurity took center stage in 2022, with cyberattacks not only continuing to cause global disturbances, but also becoming the
What is a Supply Chain Attack and How Can Organizations Defend Against Them?
Supply chain attacks were responsible for 62% of system intrusion incidents, according to Verizon’s 2022 Data Breach Investigations Report. This type of attack is one of
What is the Relationship Between Ransomware and Phishing?
Ransomware and phishing are usually put in two separate categories when cyberattack methodologies are discussed. However, ransomware operators are increasingly leveraging phishing tactics to deploy their malicious payloads, and the potential