Anatomy of a Single Request Attack: The #1 Invisible Security Threat
By Kevin Gosschalk, CEO and Cofounder, Arkose Labs Hackers are employing a new type of attack that has quickly become the scourge of network cybersecurity systems, getting around even advanced…
Conversation Marketing Security Pitfalls and Best Practices
By Morey Haber, CTO & CISO, BeyondTrust According to Gartner’s recent ‘AI and ML Development Strategies’ study, 40% of organizations cite customer experience (CX) as the number one motivator for…
Reducing the attack surface: how to empower your staff while keeping your network secure
By Pascal Bergeot is CEO of Goverlan Goverlan’s Pascal Bergeot considers what the recent Google Document hit means for remote workers and advises what companies need to do to reduce…
Hackers launched phishing attacks aimed at bypassing Gmail, Yahoo 2FA at scale
Amnesty International warns of threat actors that are launching phishing attacks aimed at bypassing Gmail, Yahoo 2FA at scale Amnesty International published a report that details how threat actors are…
Researchers demonstrate how to steal Bitcoin by exploiting SS7 issues
Hackers have exploited security weaknesses in SS7 protocol to break into a GMail account, take control of a bitcoin wallet and steal funds. In June 2016, researchers with Positive Technologies…