Skip to content

Secure Your Digital Life

  • Home
  • Data Protection

Category: Data Protection

  • Home
  • Data Protection
  • Page 199
Data Protection

245% Increase in SVG Files Used to Obfuscate Phishing Payloads

A KnowBe4 Threat Labs PublicationAuthors: James Dyer and Cameron Sweeney The KnowBe4 Threat Research team has observed a sustained increase in the use of Scalable

Read More
Data Protection

245% Increase in SVG Files Used to Obfuscate Phishing Payloads

A KnowBe4 Threat Labs PublicationAuthors: James Dyer and Cameron Sweeney The KnowBe4 Threat Research team has observed a sustained increase in the use of Scalable

Read More
Data Protection

245% Increase in SVG Files Used to Obfuscate Phishing Payloads

A KnowBe4 Threat Labs PublicationAuthors: James Dyer and Cameron Sweeney The KnowBe4 Threat Research team has observed a sustained increase in the use of Scalable

Read More
Data Protection

Avoid Being Scammed: How to Identify Fake Emails and Suspicious Links

Typos. Too-good-to-be-true offers. Urgent warnings. Scammers are getting smarter—and more convincing. New research from the Federal Trade Commission (FTC) reveals that Americans lost a staggering

Read More
Data Protection

New wave of attacks on gamers with DCRat backdoor

Since the beginning of the year, we’ve been tracking in our telemetry a new wave of DCRat distribution, with paid access to the backdoor provided

Read More
Data Protection

Best Arctic Wolf Competitors & Alternatives in 2025

Managed security services like Arctic Wolf and its competitors help companies boost cybersecurity without the hassle of an in-house IT team. It’s a practical way

Read More
Data Protection

Best Arctic Wolf Competitors & Alternatives in 2025

Managed security services like Arctic Wolf and its competitors help companies boost cybersecurity without the hassle of an in-house IT team. It’s a practical way

Read More
Data Protection

Best Arctic Wolf Competitors & Alternatives in 2025

Managed security services like Arctic Wolf and its competitors help companies boost cybersecurity without the hassle of an in-house IT team. It’s a practical way

Read More
Data Protection

New Report Highlights Common Passwords in RDP Attacks

A new report from cybersecurity experts at Specops has revealed the most common passwords used in attacks against Remote Desktop Protocol (RDP) ports. The research,

Read More
Data Protection

New Report Highlights Common Passwords in RDP Attacks

A new report from cybersecurity experts at Specops has revealed the most common passwords used in attacks against Remote Desktop Protocol (RDP) ports. The research,

Read More

Posts pagination

Previous 1 … 198 199 200 201 Next
  • Fake AI video generators drop new Noodlophile infostealer malware
  • Microsoft Teams will soon block screen capture during meetings
  • What Is CaaS (Containers-as-a-Service)?
  • Where To Watch Why Women Kill for Free (Seasons 1 & 2) in 2025
  • Your Android phone is getting a new security secret weapon – and it’s a big deal
All Rights Reserved 2024.
Proudly powered by WordPress | Theme: Fairy by Candid Themes.