cryptojacking

Phishing Insights 2021

While phishing has been around for a quarter of a century, it remains an effective cyberattack technique primarily because it continues to evolve. Adversaries are quick to identify new phishing opportunities – of which the pandemic provided many – and develop new tactics and techniques. For organizations, phishing is often the first step in a

Phishing Insights 2021 Read More »

Cloud Threat Report 2H 2020

Executive Summary : Cloud Threat Report 2H 2020 Cloud is poised to become the dominant way that organizations store their data and manage applications. Our own data shows 46% of organizational workloads are already there, with the figure likely to grow to 64% in the next 24 months. To better understand the threat landscape associated

Cloud Threat Report 2H 2020 Read More »