Top

LATEST PUBLICATIONS



Is Cryptojacking Replacing Ransomware as the Next Big Threat?

May 24, 2018

Category: Malware

Monitoring cyberthreats over time reveals interesting insights into the strategies used by cybercriminals and the evolution of the attack vectors they target. While the threat landscape continues to be quite diversified, trends do seem to run in predictable cycles. For […]


Email Security Tools Try to Keep Up with Threats

May 10, 2018

Email has long been a prime vector for cyberattacks, and hackers are only getting sneakier. Can email platforms and security tools keep up? No matter how many messaging and collaboration apps clutter the enterprise space, most (if not all) employees […]


How to manage IT risk without killing innovation

April 25, 2018

Via: CIO

Startup slogans are inescapable in tech: Move fast. Break things. Minimum viable product. These are exciting ideas, for sure, but to put them to use in IT, you’ll need to tailor them to your context. For IT executives running established […]


Network security

Ransomware Can Hit Small Businesses Big Time

May 23, 2018

Via: Zone Alarm

You run a small business. Great. Keep strong. Among all of your challenges and concerns, ignoring data protection simply isn’t an option. As small a company, you’re still a potential target for the “big business” of ransomware, that is having […]


Malware, Mobile security, Virus & Malware

Roaming Mantis Swarms Globally, Spawning iOS Phishing, Cryptomining

May 22, 2018

Via: Threat Post

The Roaming Mantis mobile banking trojan is roaming further afield than it ever has before. Recent analysis shows that the malware has rapidly evolved just in the past month. It’s now targeting Europe and the Middle East in addition to […]


Vulnerabilities

Intel Responds to Spectre-Like Flaw In CPUs

May 22, 2018

Via: Threat Post

Intel acknowledged that its processors are vulnerable to another dangerous speculative execution side channel flaw that could give attackers unauthorized read access to memory. The new vulnerability, disclosed by Google Project Zero and Microsoft’s Security Response Center, is called Variant […]