BECs double in 2022, overtaking ransomware

A look at 4th quarter 2022, data suggests that new threat surfaces notwithstanding, low-code cybersecurity business email compromises including phishing, as well as MFA bombing are still the prevalent exploits favored by threat actors. The post BECs do...

By |2023-03-20T18:43:58+00:00March 20, 2023|business email compromise, Cloud, cloud security, cybersecurity, phishing, ransomware, Security, Uncategorized|Comments Off on BECs double in 2022, overtaking ransomware

The Biden administration may eye CSPs to improve security, but the real caveat emptor? Secure thyself

While the administration may look to strengthen security against cyberattackers for cloud providers, like Amazon, Microsoft and Google, experts say the onus is on the customer. The post The Biden administration may eye CSPs to improve security, but the...

By |2023-03-16T20:37:12+00:00March 16, 2023|Amazon, AWS, Cloud, cloud security, cloud security policy, cloud service provider, cloud threats, cybersecurity, Google, Microsoft, Security, Uncategorized|Comments Off on The Biden administration may eye CSPs to improve security, but the real caveat emptor? Secure thyself
Go to Top