illustration of laptop with browser that lacks visibility leading to different malware and web threats

Browsing blind: Understanding the dangers of limited browser visibility

The browser has emerged as the most widely used enterprise application today. That’s good news for users who need to access corporate data and business tools from anywhere with a reliable Internet ...
How Social Engineering works

Psychological Manipulation in Social Engineering: Unveiling the Tactics

Have you ever found yourself in a situation where you felt like someone was trying to manipulate you into doing something you didn’t want to do? Perhaps it was a friend, family ...
illustration of websites on fishing hooks with text LURE

How Legacy URL Reputation Evasion (LURE) attacks easily bypass current security tech

Whether it’s the push for fully remote work, in-office work, or a hybrid workstyle, the conversation around how and where employees will work continues. But guess what? To cybercriminals, this conversation doesn’t ...
Navigating the Digital Landscape: A Guide for Young People on Managing Their Online Identities

Navigating the Digital Landscape: A Guide for Young People on Managing Their Online Identities

Your online identity is precious, and protecting it should be your top priority. Discover practical strategies to safeguard your personal information and maintain control over your digital presence ...
illustration of hacker on computer with text reading html smuggling

Digital smugglers: How attackers use HTML smuggling techniques to beat traditional security defenses

It’s hard to imagine a time when the web browser wasn’t the critical enterprise productivity app. Many enterprise workers born in the 1990s likely don’t recall when the web browser wasn’t the ...
Cybersecurity Skills in High Demand

How Organizations can Thrive Despite the Cybersecurity Skill Shortage

Introduction Organizations across industries face a common challenge – the Cybersecurity Skill Shortage.  IBM Data Breach Report revealed that an alarming 83% of organizations experienced more than one data breach during 2022, ...
illustration of web browser with warning symbol

Escalating evasive browser attacks: Understanding the whys

Cybersecurity is a perpetual challenge of strategy and adaptation. Threat actors find a vulnerability, and, eventually, security vendors plug the hole. Attackers find another way into the network, and a patch is ...
illustration of android person with laptop computer

Is AI revolutionizing cybersecurity? The answer isn’t as clear.

Peruse last quarter’s press releases from top cybersecurity vendors, and it’s hard to miss the focus on artificial intelligence (AI) and machine learning (ML). According to these vendors, traditional security tools are ...
AI's role in revolutionizing browser security

Breaking the misconception: Unveiling AI’s impact on browser security

To say artificial intelligence (AI) has been a buzzword in the security industry is a massive understatement. One thing’s for sure, there are often misconceptions surrounding AI’s true potential. In a recent ...
Illustration of robot stealing files from computer

The opportunities and risks of ChatGPT in cybersecurity

A lot of ink has been spilled over the past several months about the impact generative artificial intelligence (AI) platforms and chatbots like ChatGPT will have on cybersecurity. Many people, rightly so, ...