• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Search Results: phishing

Google AI Investment, Anthropic, OpenAI, ChatGPT

Google Introduces Chrome OS Flex To Replace Windows, macOS On Older Devices

Google says Chrome OS Flex will be compatible with its cloud-based management and help modernize endpoints already in the IT environment.

February 15, 2022 Zachary Comeau Leave a Comment

Google has introduced a new version of Chrome OS that can turn PCs and Macs into a Chromebook, and the software designed for businesses and schools will be free to download, the company says. In a blog, the company says Chrome OS Flex will be fully compatible with Google’s cloud-based management and helps modernize endpoints […]

Read More

ZeroFox Releases 2022 Forecast Report Anticipating Increases in Ransomware, Third-Party Compromises and Malware-as-a-Service

February 10, 2022 TechDecisions Staff Leave a Comment

New report details expected threat activity trends and recommendations for security teams to address external threats WASHINGTON–(BUSINESS WIRE)–ZeroFox, a leading external cybersecurity provider, today published the “2022 Threat Intelligence Forecast,” detailing expected cybercriminal behavior trends including ransomware, malware-as-a-service, vulnerabilities and exploits. Within the report, the ZeroFox Intelligence team reviews 12 months of threat actor activity […]

Read More

NordVPN Threat Protection

NordVPN Steps Further Into Cybersecurity With Threat Protection Offering

NordVPN's Threat Protection will offer protection against web trackers and malicious ads, harmful websites, and infected files.

February 9, 2022 Zachary Comeau Leave a Comment

NordVPN is stepping into the antivirus market with the release of Threat Protection, a new cybersecurity product integrated into the NordVPN app that offers protection against phishing attempts, malicious websites, infected files and other online threats. Specifically, the new offering mitigates three primary kinds of threats: web trackers and malicious ads, harmful websites and infected […]

Read More

Growth of Digital Commerce Leads to Explosion of External Attack Surface, Fueling 1.5X increase in Online Fraud in 2021

February 9, 2022 TechDecisions Staff Leave a Comment

Bolster research shows that fraud campaigns are at the highest levels since start of COVID pandemic LOS ALTOS, Calif.–(BUSINESS WIRE)–Bolster Inc., a deep learning-powered fraud prevention company protecting the world’s leading brands, today published its 2022 State of Phishing and Online Fraud Report and companion Global Fraud Index. The analysis shows an unprecedented level of […]

Read More

The Average Ransomware Payment In Q4 Was Over $322,000

Increasing law enforcement attention is forcing ransomware actors to target larger companies, pushing average ransomware payments higher.

February 8, 2022 Zachary Comeau Leave a Comment

Ransomware payments have skyrocketed in recent months, hitting an average of over $300,000 in the last quarter of 2021, as the risks of doing business has increased for ransomware threat actors, according to a new report. Coveware, a ransomware recovery firm, reports that the average ransomware payment in the fourth quarter was $322,168, a 130% […]

Read More

3CX Supply Chain Attack

Microsoft Temporarily Disables Exploited MSIX Protocol Handler

Microsoft disabled the MSIX ms-appinstaller protocol and is working on a fix after a bug was discovered that allows attackers to spoof App Installer.

February 7, 2022 Zachary Comeau Leave a Comment

Microsoft says that it has disabled the MSIX ms-appinstaller protocol and is working on a fix after a security bug was discovered that allows an attacker to spoof App Installer. According to a Microsoft Tech Community blog, an attacker could spoof App Installer to install a package that a user did not intend to install. […]

Read More

Microsoft Security RSA Conference

Microsoft: MFA Adoption At 22%

Despite an evolving cyberthreat landscape, just 22% of Microsoft Azure Active Directory customers have implemented MFA, passwordless tools.

February 7, 2022 Zachary Comeau Leave a Comment

Despite a cyberthreat landscape that continues to evolve and become even more dangerous, just 22% of Microsoft Azure Active Directory customers have implemented strong identify authentication protection, Microsoft says in a new report. In the company’s Cyber Signals report, a new quarterly cyber threat intelligence brief marketed to IT and security leaders, Microsoft says less […]

Read More

Menlo Security Finds Cloud Migration and Remote Work Gives Rise to New Era of Malware, Highly Evasive Adaptive Threats (HEAT)

February 2, 2022 TechDecisions Staff Leave a Comment

Menlo identified 224% increase in HEAT attacks in the last six months fueling ransomware surge MOUNTAIN VIEW, Calif.–(BUSINESS WIRE)–#cloudsecurity—Menlo Security, a leader in cloud security, today announced it has identified a surge in cyberthreats, termed Highly Evasive Adaptive Threats (HEAT), that bypass traditional security defenses. HEAT attacks are a class of cyber threats targeting web […]

Read More

Curricula Launches Free SOC 2 Security Awareness Training

February 1, 2022 TechDecisions Staff Leave a Comment

Businesses undergoing a SOC 2 audit can now access free SOC 2 security awareness training content and educational materials for their employees ATLANTA–(BUSINESS WIRE)–#cybersecurity—Curricula, the fun security awareness company, today announced their SOC 2 employee security awareness training program is now available for free on its platform. Now every organization that is implementing a SOC […]

Read More

Zoom Zero-Day

Double Check That Zoom Meeting Invite Before You Click ‘Start Meeting’

This latest phishing scheme seizes on the everyday workflow of accepting and starting a Zoom meeting.

January 31, 2022 Alyssa Borelli Leave a Comment

Attackers are now seizing the opportunity to spoof Zoom meeting invites. About 10,000 mailboxes have been hit with the socially engineered emails, according to cybersecurity company Armorblox. The social engineered attacks are designed to look like a legitimate email from Zoom mimicking existing business workflows. Attackers will use the Zoom email address, “Zoom Communications” and […]

Read More

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 15
  • Page 16
  • Page 17
  • Page 18
  • Page 19
  • Interim pages omitted …
  • Page 37
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.