We looked back at 2018’s mobile threat landscape to see the possible threats that lie ahead and help users and organizations proactively defend against them.
To provide organizations a comprehensive view of the email threat landscape, we look at notable occurrences of advanced email threats used by cybercriminals as well as advanced security techniques that can effectively defend against them.
CVE-2019-5736 is a vulnerability involving the runC runtime component, which is used for container platforms such as Docker and container orchestration platforms such as Kubernetes.
Looking back at the most significant issues of 2018, we saw shifting cybercriminal strategies and lingering security threats. Enterprises faced a multitude of challenges, but careful study of these issues can present opportunities for improvement.
Malware can hide from antivirus (AV) software by abusing features in Intel Software Guard Extensions (SGX). This was recently demonstrated by Michael Schwarz, Samuel Weiser, and Daniel Gruss, researchers at Graz University of Technology.
Catching malware outbreaks early keeps users, communities, enterprises, and governments safe. But if malware samples are scarce, can machine learning help analyze, detect, and end an outbreak?
Our continued forays into the cybercriminal underground allowed us to see how the tactics and techniques used to attack financial organizations changed over the years.
We found a malicious app posing as Adobe Zii (a tool used to crack Adobe products) targeting macOS systems to mine cryptocurrency and steal credit card information.
In light of the massive data dump called Collection #1 and with more available for download and exchange in the underground, here are a few reminders for users and enterprises on how to mitigate threats on their personal information and enterprise assets.