A particular nation state bad actor is at it again - this time using business apps to hide malware. We provide the sourced reporting and some solutions.
Read More"Contact Us" phishing schemes are causing stress. We examine how ZipLine-style attackers turn routine web inquiries into a backdoor malware delivery system.
Read MoreMicrosoft Teams is being used in social engineering scams. We examine the warning signs users should recognize and outline practical steps they should take if they suspect a compromise.
Read MoreA former employee is sent to jail for creating "infinite loops". We examine how non-terminating threads can crash critical systems.
Read MoreA particular nation state bad actor is at it again - this time using business apps to hide malware. We provide the sourced reporting and some solutions.
Read MoreAn employee steals $100K from her employer, in part by opening new lines of credit. We comment on practical steps employers can take to tighten authorization, monitoring, and enforcement to prevent employees from opening credit lines.
Read MoreA new survey states that most U.S. workers are ready and willing to decline extra work. Is that how it works in your organization? We want to know.
Read More"Contact Us" phishing schemes are causing stress. We examine how ZipLine-style attackers turn routine web inquiries into a backdoor malware delivery system.
Read MoreA survey reveals most employees feel protected at work, but many employees report different forms of wrongdoing. We chime in and want to know your opinion.
Read More