Skip to content
Sunday, June 15, 2025
The TechBriefs
  • Home
  • Technology
  • AI
  • Computers
  • Security
  • Internet
  • Press Releases
    • GlobeNewswire
    • PRNewswire
  • Contact

Category: cybersecurity

  • Home
  • cybersecurity
  • Page 26
Operational tech under attack, deepfake phishing and learning to use passkeys — cybersecurity predictions for 2025
  • 2025 predictions
  • Article
  • cybersecurity
  • Deepfake
  • hacktivism
  • Operational Technology
  • Passkeys
  • Phishing
  • Technology
  • Uncategorized

Operational tech under attack, deepfake phishing and learning to use passkeys — cybersecurity predictions for 2025

  • 0

With a constant power struggle between attackers and defenders cybersecurity is a fast-moving area. That makes it notoriously hard to […]

Europe’s move toward cybersecurity sovereignty [Q&A]
  • Article
  • cybersecurity
  • Europe
  • European Union
  • GDPR
  • Law
  • Q&A
  • Technology
  • Uncategorized

Europe’s move toward cybersecurity sovereignty [Q&A]

  • 0

Governments around the world are increasingly legislating for cybersecurity and privacy. But regions often have differing views on how this […]

Get ‘Resilient Cybersecurity’ for FREE and save $39.99!
  • Article
  • cybersecurity
  • Resilient Cybersecurity
  • Technology
  • Uncategorized

Get ‘Resilient Cybersecurity’ for FREE and save $39.99!

  • 0

Building a comprehensive cybersecurity program addresses the current challenges and knowledge gaps in cybersecurity, empowering individuals and organizations to navigate […]

Threat actors spoof email security providers
  • Article
  • cybersecurity
  • Phishing
  • Spoofing
  • Technology
  • Uncategorized

Threat actors spoof email security providers

  • 0

A new report from phishing defense company Cofense highlights increasingly sophisticated phishing attacks that are exploiting trusted email security companies […]

Credential phishing attacks up over 700 percent
  • Article
  • credential theft
  • cybersecurity
  • Phishing
  • Technology
  • Uncategorized

Credential phishing attacks up over 700 percent

  • 0

Phishing remains one of the most significant cyber threats impacting organizations worldwide and a new report shows credential theft attacks […]

More task focus, the rise of AI whisperers and improved observability — AI predictions for 2025
  • 2025 predictions
  • Article
  • Artificial Intelligence (AI)
  • cybersecurity
  • Digital Transformation
  • Technology
  • Uncategorized

More task focus, the rise of AI whisperers and improved observability — AI predictions for 2025

  • 0

Artificial intelligence has been one of the fastest growing areas in the tech sector over the past few years. As […]

Data breach trends — progress, challenges, and what’s next [Q&A]
  • Article
  • cybersecurity
  • data breaches
  • Q&A
  • Technology
  • Uncategorized

Data breach trends — progress, challenges, and what’s next [Q&A]

  • 0

Despite organizations putting in place better security controls the pace of data breaches shows no signs of slowing down. We […]

More complexity, more non-human IDs and shifting strategies — identity predictions for 2025
  • 2025 predictions
  • Article
  • cybersecurity
  • Identity
  • Identity and access management
  • machine identities
  • Technology
  • Uncategorized

More complexity, more non-human IDs and shifting strategies — identity predictions for 2025

  • 0

Identity is at the root of most cyberattacks, but although we’re seeing greater adoption of things like biometrics we still […]

Newly launched APIs found by attackers in under 30 seconds
  • API
  • API attack
  • Article
  • cyberattack
  • cybersecurity
  • Honeypot
  • Technology
  • Uncategorized

Newly launched APIs found by attackers in under 30 seconds

  • 0

Organizations rely on APIs to make their systems easily accessible across platforms. However, new APIs are typically less protected and […]

Access tokens and service accounts next target for cyberattacks
  • Article
  • Artificial Intelligence (AI)
  • cybersecurity
  • machine identities
  • Technology
  • Uncategorized

Access tokens and service accounts next target for cyberattacks

  • 0

New research shows 88 percent of security leaders believe machine identities, specifically access tokens and their connected service accounts, are […]

Posts pagination

Previous 1 … 25 26 27 Next
  • Privacy Policy
  • Terms of use
Theme: Terminal News By Adore Themes.