Featured Blog
Poisoned Search: How Hackers Turn Google Results into Backdoors
If you searched “Download Microsoft Teams” in late September, you might have seen a very convincing ad at the top of your results. It looked legitimate—Microsoft logo, professional text, the works. But clicking that ad could have installed a remote access Trojan on your system. That’s what researchers at Blackpoint Cyber’s Security Operations Center (SOC) […]
Cyberattacks, Cybersecurity leadership, Incident Response
The Cybersecurity Information Sharing Act Has Lapsed—Here’s How to Adapt & Stay Ahead of Attackers
Multifactor Authentication, Social Engineering
Hackers Are Targeting Your Salesforce: What You Need to Know
Insider Threats
Can Your Hiring Process Catch a Deepfake Employee? A Cybersecurity Insider Threat Checklist
Cyberattacks, Insider Threats
North Korea’s Deepfake Remote Workers: How They’re Getting Inside U.S. Companies — and How to Stop Them
Cyberattacks, Cybersecurity