- 13 de diciembre de 2022Enterprises and organizations are facing a period of transition and uncertainty – malicious actors will hunker down and reuse tried-and-tested tools and techniques.
- 05 de abril de 2021Many employees have set up makeshift work spaces in their homes. This could leave them more susceptible to ransomware attacks that take advantage of vulnerabilities in unsecured spaces.
- 15 de diciembre de 2020We analyzed the tools, relationships, and behaviors used in a long-standing intrusion of a company after its security team observed malicious C&C traffic.
- 02 de junio de 2020Access control devices that use facial recognition manage entry and exit into an enterprise’s premises. They are essentially the first line of defense for many businesses, but are they secure?
- 30 de abril de 2020Many attackers are switching from file-based malware to memory-based attacks to improve their stealth. “Fileless,” “zero-footprint,” or “living off the land” threats use legitimate applications to carry out malicious activities.
- 14 de octubre de 2019The extent with which 5G networks use software is one of the top security issues for mobile networks as well as devices and current technologies (for example, 3G, 4G) that use or incorporate it, according to an EU report supported by the European Commission
- 23 de septiembre de 2019The nonprofit group Open Privacy Research Society recently publicized that the confidential medical and personally identifiable information (PII) of patients across Vancouver, Canada, is being leaked through the paging systems of hospitals in the area. What do
Information-Stealing Malware with Connections to Ryuk Targets Government, Military, and Financial Files16 de septiembre de 2019A new family of malware with an apparent connection to the notorious Ryuk ransomware was uncovered — but instead of encrypting files, they were found targeting government-, military-, and finance-related files.
- 18 de octubre de 2018Continued innovations in mobile technology enable businesses to respond to growing demands. Here are some best practices to make sure that the whole enterprise is protected against constantly evolving threats.