Things will be changing as you head into the metaverse, so you should be considering how you will support such work. Story on TechRepublic
Latest
This sneaky fraud attack looks like an email forwarded by your boss
Another new approach. You need to always be thinking… Story on ZDNet
New Chaos malware spreads over multiple architectures
New Malware that attacks multiple architectures. Story on TechRepublic
How ransomware gangs operate like legitimate businesses
Most people assume that they are not a Target – No one is after me! Unfortunately, Not-Me is no protection against cybercrime. Most Ransomware gangs are not looking for targets, EVERYONE is a target in their business. Story on TechRepublic
Malware Found Hiding in a Windows Logo
Cybercriminals have no shortage of creativity. An attack hiding in a Windows Logo… Story on PCMag
Wrong Numbers, Fake Invoices, and Catfishing: How to Avoid the Top Internet Scams
It is very important to understand How You Get Attacked. This PCMag article covers in general how to recognize and avoid the Top Internet Scams. Story on PCMag
New Exchange Server zero-day vulnerabilities are being used in cyberattacks: Protect your network now
Protect yourself from the latest Exchange zero-day problems. Story on ZDNet
Fake CISO Profiles on LinkedIn Target Fortune 500s
The largest companies are being subjected to new variations on a theme. Story on Krebs On Security
Challenges and benefits of cloud migration
Do you want to understand the issues with migrating to the Cloud? Story on TechRepublic
XeroLinux could be the most beautiful Linux desktop on the market
Using Linux, and looking for a new desktop? Story on ZDNet