Kaspersky 2025 SMB threat report

Cyberattackers often view small and medium-sized businesses (SMBs) as easier targets, assuming their security measures are…

How the Batavia spyware targeting Russian organizations works

Introduction Since early March 2025, our systems have recorded an increase in detections of similar files…

Deconstructing RACF in z/OS and uncovering security issues

In our previous article we dissected penetration testing techniques for IBM z/OS mainframes protected by the…

Don’t trust that email: It could be from a hacker using your printer to scam you

In the campaign observed by Varonis’ forensics experts, the attacker used PowerShell to send emails that…

Was CISOs von Moschusochsen lernen können

Das ist die Essenz dessen, was ich als “Moschusochsenstrategie” bezeichne. Der Hintergrund: Werden Moschusochsen von Wölfen…

The CSO guide to top security conferences

Blue Team Con 2024, Chicago, Illinois: 4-7 September Gartner IT Symposium/Xpo, Queensland, Australia: 8-11 September 16th…

Social media platforms marketers should watch in 2025

Three years ago, if you’d asked Kasey Brown, founder and CEO of Different Breed Media, she’d…

Lead form best practices for capturing high-quality prospects

When I was first setting up my freelance business website, I read tons of articles and…

AI agents for marketing — I talked to experts about the benefits

I love the Back to the Future series, especially Part II where we see “the future.”…

The Solidity Language open-source package was used in a $500,000 crypto heist

Attacks that leverage malicious open-source packages are becoming a major and growing threat. This type of…