CISO August 13, 2019 Bypass the Cost of Ownership With Security-as-a-Service (SECaaS) 3 min read - For organizations looking to maximize their security budget, security-as-a-service (SECaaS) solutions offer a way to achieve security outcomes without paying the cost of ownership.
Intelligence & Analytics August 12, 2019 What Is Security Intelligence? Here’s What Your Business Leaders Want to Know 3 min read - How do you explain security intelligence to your COO? In today's heightened threat landscape, where business leaders are reading about breaches in the news every day, it's crucial to do your homework.
August 6, 2019 Phishers Impersonate Engineering License Boards to Target Utilities With LookBack Malware 2 min read - Phishers are impersonating engineering license boards in order to target U.S. utility organizations with LookBack malware.
August 6, 2019 SystemBC Malware Using SOCKS5 Proxies to Mask Traffic for Attack Infrastructure 2 min read - A new proxy malware called SystemBC is using SOCKS5 proxies to mask traffic for command-and-control (C&C) infrastructure involved in banking Trojan attacks.
July 22, 2019 MegaCortex Ransomware Uses Aggressive Ransom Notes to Coerce Payments 2 min read - Researchers analyzed a sample of the MegaCortex ransomware family that used an aggressive ransom note to bully victims into meeting their demands.
July 10, 2019 Zoom Vulnerability Could Let Third Parties Take Over Webcams 2 min read - A zero-day Zoom vulnerability could allow third parties to snoop on videoconferencing calls, reactivate uninstalled apps and conduct other malicious activities.
July 3, 2019 Godlua Backdoor Capable of Performing DDoS Attacks 2 min read - Both versions of the Godlua backdoor, discovered in late April, are capable of performing distributed denial-of-service (DDoS) attacks, according to a new report.
July 1, 2019 Attack Campaign Leverages B2B Site to Distribute New Spelevo Exploit Kit 2 min read - A recent attack campaign leveraged a business-to-business (B2B) website to distribute a new exploit kit named Spelevo.
Endpoint July 1, 2019 Technology, the Enterprise or the User: Which Owns Mobile Security? 4 min read - To best manage mobile security within your enterprise, you need to maintain balance between technology, enterprise and user responsibilities.
Endpoint June 25, 2019 Is Your Endpoint Protection Strategy Ready for 5G? 5 min read - If you accept that 5G technology comes with three inherent challenges — manageability, the supply chain and usage — then the endpoint protection challenge makes a whole lot more sense.