The Jericho Security Blog
Stay ahead of digital threats with expert insights, tips, and analysis on the latest in cybersecurity.
The Marco Rubio Impersonation Attack and What It Means for CISOs
Yesterday, we learned that an unknown actor used AI-generated voice cloning to pose as U.S. Secretary of State Marco Rubio, cold-calling three foreign ministers, a U...
Cyber Security: Policy Template for Small Business
Large corporations aren’t the only ones at risk from hackers and other cybercriminals. Small businesses everywhere are increasingly targeted: according to Verizon's ...
4 Common Causes of Data Breaches Include...
Most of us remember the 2013 Yahoo data breach. It affected all three billion Yahoo user accounts, exposing personal information including names, email addresses, ph...
How to Handle a Data Breach: A Guide for Businesses
Data breaches are a growing threat that can strike any business, large or small. The impact of a breach goes beyond just data loss – it can devastate your company’s ...
Deepfake Phishing: The AI-Powered Social Engineering Threat Putting CISOs on High Alert in 2025
In 2024, British engineering firm Arup lost approximately $25 million after scammers used AI-generated deepfakes to impersonate the company’s CFO and trick an employ...
What is Cybersecurity Policy?
According to a recent study by Duke University, over 80% of U.S. companies have reported being successfully hacked. These businesses experienced damage that included...
How to Build a Positive Security Culture That Actually Changes Behavior
By Sage Wohns, CEO of Jericho Security