Protecting Against Spam and Phishing Attacks With a Layered Approach to Email Security

August 18, 2017

Layered schemes are used in most information security strategies, and it is essential to establish a similar approach to protecting the organization from unwanted email. In fact, spam and phishing are some of the biggest problems IT security managers face […]

The anatomy of a completely fileless attack

August 4, 2017

Category: Virus & Malware

The use of fileless malware is definitely on the rise, and it’s used both by targeted threat actors and cybercriminals. Trend Micro researchers, though, are keen to explain that there are malware that are fileless only while entering a user’s system […]

Over 600 Malware Samples Linked to Chinese Cyberspy Group

July 25, 2017

A China-linked cyber espionage group tracked by security firms as Lotus Blossom, Elise, Esile and Spring Dragon has used more than 600 malware samples in its attacks over the past years, according to Kaspersky Lab. Spring Dragon has been around […]


Access Bypass Vulnerabilities Patched in Drupal 8

August 17, 2017

Via: Security Week

A Drupal 8 security update released on Wednesday addresses several access bypass vulnerabilities affecting components such as views, the REST API and the entity access system. The most severe of the flaws patched by Drupal 8.3.7 is CVE-2017-6925, a critical […]


NotPetya ransomware caused $300m losses to the shipping giant Maersk

August 17, 2017

Via: Security Affairs

A.P. Moller-Maersk, the transportation and logistics firm, announced Tuesday that it would incur hundreds of millions in U.S. dollar losses due to the NotPetya ransomware massive attack. According to the second quarter earnings report, there were expecting losses between $200 million and $300 million due […]

Data loss, Malware, Mobile security

How shared Android libraries could be weaponized for data theft

August 16, 2017

Via: Naked Security

Android users know the routine: download an app and a box appears asking for permission to talk to other apps. Knowing that the app needs that access to work properly, the user clicks “OK” without a second thought. But what […]