In the security industry, we rarely tell a story from the victimโs perspective. Instead, we focus on a malicious actorโs perspective: their tactics, techniques, and procedures (TTPs). So, I decided to take a turn as a victim and see what happened after visiting a compromised website with malicious adtech.
The Voice of Cyberยฎ
TECHNOLOGY
Newest Release
Deep Dive Articles
Sort By
- Date
- Title
Businesses thrive on periods of sustained growth, but itโs important to have systems and security settings that can keep up with the requirements of an expanding physical and ...
The use of cyberattacks in executing modern warfare, which is already happening, will enter public awareness
A major cyberattack will be executed on critical infrastructure ...
As humans, we all walk through the world with a certain level of uncious bias. It makes sense then that anything we โinventโ is inherently riddled with this bias whether we ...
Phishing-resistant users build phishing-resistant enterprises. With the growing sophistication of cyber threats, enterprises that can efficiently raise the bar for security ...
With cyber-attacks are becoming increasingly sophisticated and frequent, thereโs a compelling need to better leverage Artificial Intelligence (AI) capabilities in cyber, from ...
With Australian and international authorities calling out lateral movement incidents multiple times this year, itโs clearly an area where improvements are being urgently ...
In The News
Sort By
- Date
- Title
Dragos and Yokogawa Electric have partnered to enhance industrial cybersecurity. By integrating Dragosโs OT cybersecurity platform with Yokogawaโs CENTUM VP system, the ...
Ciscoโs end-to-end solution protects both the development and use of AI applications so enterprises can advance their AI
initiatives with confidence.
AI ...
With 2024 behind us, we saw another challenging year in the world of cybersecurity โ highlighted by new and evolving threats like Artificial Intelligence (AI)-driven phishing ...
Industry veteran with experience scaling notable network security brands joins world-class management team to accelerate momentum
New easy-to-deploy online security posture assessment for hybrid AD environments provides unprecedented visibility into security vulnerabilities, reducing cyberattack risk ...
Microsoft patched a whopping 157 CVEs in its inaugural Patch Tuesday for 2025. Not only is this the largest number of CVEs patched in January, it is the largest number of ...