March 23, 2016 Symantec Endpoint Protection Hosed by Three Severe Vulnerabilities 2 min read - An endpoint protection solution from Symantec was recently found to have three severe vulnerabilities that could leave users vulnerable to cyberattacks.
March 22, 2016 Singapore: An Emerging Target for Cyberthreats and Banking Trojans 4 min read - It is no coincidence that threats target Singapore, one of Asia's most advanced countries in digital banking with the highest variety of digital offerings.
March 22, 2016 Hands-On Approach: UK Opts for One-Stop Information Security Shop 2 min read - The U.K. has launched an organization that will prioritize information security and information sharing across businesses and industries.
March 21, 2016 The Five Percent: HTTPS Redirects Under Threat Thanks to Slow HSTS Adoption 2 min read - Shifting to HTTPS is vital for websites, but many organizations are not implementing it properly and leave users at risk as a result.
March 21, 2016 Mightier Than the Sword? Pen Testing Tools Used as Ransomware Delivery Device 2 min read - Cybercriminals are leveraging pen testing tools and white-hat best practices to deliver advanced ransomware that has longer life spans and bigger payouts.
March 18, 2016 TeslaCrypt Ransomware 3.0.1 No Longer Leaves Keys Around to Sniff 2 min read - TeslaCrypt ransomware 3.0.1 is an improvement over previous versions, making the malware highly resistant to decryption efforts.
March 17, 2016 Radamant Ransomware Can Be Tricked Into Decrypting Data Without Compensation 2 min read - Researchers recently discovered a possible solution for a Radamant ransomware variant. Here's what you need to know about this threat.
March 17, 2016 Going Under? Alert Avalanche Impacts Incident Response 2 min read - Recent studies showed that incident response teams are suffering from an overload of security alerts, which are a major drain on the team's resources.
March 16, 2016 Bad Ads? Angler-Based Malvertising Reels in Mainstream Sites 2 min read - Security vendors recently discovered a massive malvertising campaign linked to the Angler exploit kit targeting top-tier websites.
March 16, 2016 Fileless Malware Loaded Into Memory via PowerShell 2 min read - Malicious macros used in phishing emails can load fileless malware, which goes into a machine's program memory and can wreak havoc.