HTML smuggling attacks are on the rise and unfortunately are able to evade traditional cyber defenses. Learn what these attacks are, and what you can do about them
A key – yet rarely covered -- fact about supply chain attacks is that each one starts with a successful attack on the supplier. Stop those, and you prevent the supply chain multiplier effect.
Instant Messengers like WhatsApp are widely used to communicate with business associates as well as friends and family. But IM web clients can pose a real danger to network security.
Google Gets a Jump on Cyber Awareness Month with Repeated Zero Day and High Severity Threat Disclosures
With browsers increasingly under attack, it is more essential than ever to protect your organization with remote browser isolation
Costs are rising, but there's good news, too. Breaches of companies that had Zero Trust deployed were less frequent and cost 35% less than for companies that did not deploy Zero Trust
Using open redirects takes phishing email deceptiveness – and therefore effectiveness -- up a notch by displaying a legit-seeming URL to users who are prudent enough to hover over a link.
Credential theft came roaring back in the first half of 2021 as the top phishing technique, with legitimate websites that have been compromised as the most popular staging ground.
Data from the first quarter of 2021 indicates that ransomware strains are becoming increasingly diverse and therefore more difficult to detect. Email and the web remain the dominant delivery channels, with one or both almost always included in often-complex delivery chains.
MPA Best Practice Guidelines Name RBI as Implementation Guidance Infrastructure for Web Filtering and Usage Control
In a recent move to ease web use – while rigorously protecting valuable content -- MPA Guidelines now recommend RBI for content producers and delivery companies. Here are some factors that MPA members should consider when choosing an RBI solution.