Who Are Cyber Spies?
Every day we refer to those who commit cyber attacks as “hackers”. The image does not project an image of a a terrible criminal....
Hacked Out of Business — Why the Industry Should Focus More on SMB Security
Small and medium businesses (SMBs) comprise over 99 percent of U.S. firms, which might explain why they often find themselves in hackers’ crosshairs. However,...
Biostar security software (developed by Suprema), leaked fingerprints and other data on millions of...
Are you really that surprised that biometric data has been leaked?
Yet another example of how all of the data that companies are so busy...
Interac Corp. reveals new insights into consumer behaviour and online activity
As we commence Cybersecurity month, Interac Corp. is revealing new insights into consumer behaviour and online activity, in particular when it comes to consumer...
New Cybersecurity Report from Devolutions Reveals Trends, Stats, Recs for SMBs
Montreal-based developer Devolutions released a report titled, “The State of Cybersecurity in SMBs in 2021-2022,” which features stats and trends from Devolutions’ second annual...
CYE’s “Hyver” analyses cyber risk in real-time adding a monetary value to the business...
CYE, a leader in cybersecurity optimization platforms, announced a new capability in its Hyver platform that calculates dynamic risk in real-time. Hyver sets a new...
Kaspersky research finds DDoS attacks almost double in Q4 2019
Here is a report from Kaspersky, according to them the number of attacks blocked by Kaspersky DDoS Protection in Q4 2018 amounts to only...
Passportal: Platform for Automation and Security of Passwords & Documentation
Passportal is a password security platform with integrated documentation and automation solutions helping MSPs improve their service delivery model. Not only does it secure...
Axis Security Sets the Standard for Zero Trust Network Access Market
Axis Security, a leading provider of Zero Trust Network Access, is enabling leading enterprise organizations to expand beyond traditional access technologies to a more...
Avoiding QR Code and SMS Phishing
In October 2023, SlashNext Threat Labs published a blog post detailing how threat actors leverage QR codes for various attacks and breach attempts. More recently,...















