Targeted spear phishing attacks remain a threat to every business. Make sure your employees know how to spot them and what to do to minimize the risk.| BlackFog
Clone phishing is a subtle but dangerous attack that's easy to miss. Learn how it works, how it differs from other threats and what to do if someone falls victim.| BlackFog
Credential harvesting is a leading cyberthreat. Learn how attackers steal login credentials, and how your business can stop them.| BlackFog
Learn how cybercriminals are using generative tools to drive AI phishing attacks to craft more convincing emails and what firms can do to stay safe.| BlackFog
Find out everything you need to know about how to prevent phishing malware from impacting your business in our comprehensive guide.| BlackFog
Find out why businesses should be considering AI endpoint security solutions and what benefits can these offer over legacy EDR tools.| BlackFog
Find out why cybersecurity pros should be treating AI prompt injection hacks in the same way as social engineering attacks.| BlackFog
What does adaptive security involve and why is it essential in an era of AI-powered cyberthreats?| BlackFog
Learn about some of the key LLM cybersecurity issues that need to be considered when adding tools like generative AI to firms' systems.| BlackFog
At WWDC 2025, Apple introduced an interesting new API, NEURLFilter, to respond to a key challenge we’ve talked about previously: the inherent conflict between privacy and security when trying…| text/plain
The vast majority of cyberthreats arrive via one of two related sources: That means that by combining network-level sensors and throttles with threat intelligence (about attacker sites), security s…| text/plain
Last November, I wrote a post about the basics of security software. In that post, I laid out how security software is composed of sensors and throttles controlled by threat intelligence. In today&…| text/plain