Microsoft Spoofs: This week’s threat report highlights the persistent danger of spoofed Microsoft communications, aiming to deceive users into divulging crucial credentials or falling for support scams.
Author Archive for: lacey.anderson
You are here: Home1 / lacey.anderson
This author has not written his bio yet.
But we are proud to say that lacey.anderson contributed 106 entries already.
Entries by lacey.anderson
This week’s incidents highlight the critical need for a layered defense against cyber threats. Discover how ConcealBrowse provides essential browser-based threat protection, intercepting threats others miss and offering early intervention for advanced security.
Conceal teams up with Fortem-IT for advanced global IT solutions, blending browser security with tailored services.
AI in cybersecurity offers advanced protection for organizations against cyber threats, but also poses unique challenges and misuse by bad actors.
Explore the evolution of phishing attacks from humble beginnings in the early 1990s to the sophisticated AI-driven tactics of 2020. This infographic delves into the tactics cybercriminals have employed over the years, showcasing how technology, social engineering, and AI have shaped the landscape of online security threats.
Gordon Lawson, CEO, joins LiveNow from FOX to comment on the cyber threats we face from foreign actors.
In our latest threat report, we delve into the dynamic landscape of cyber threats, highlighting the importance of proactive detection and intervention. From malware-disguised browser extensions to sophisticated scams posing as legitimate sites, our analysis underscores the need for advanced security measures to stay ahead of evolving risks. Stay informed and stay protected with our insights.
The quality and quantity of browser-based phishing attacks have escalated dramatically over the past year, posing a significant threat to online security.
Cybercrime Magazine talks to former US Navy CISO Christopher Clearly and Conceal CEO Gordon Lawson. You can learn a lot about cyber warfare, cybercrime, ransomware, cybersecurity, and more from these two United States Naval Academy grads and thought leaders.
This week’s threat report highlights a surge in credential theft phishing, a discreet threat with a 54% incident rate. Examples include Yahoo! login deception, IP address cycling in phishing campaigns, and a Microsoft look-alike site exploiting muscle memory for password entry.