Radio frequency (RF) technology is being used in operations to control various industrial machines. However, the lack of implemented security in RF communication protocols could lead to production sabotage, system control, and unauthorized access.
Fileless threats aren’t as visible compared to traditional malware and employ a variety of techniques to stay persistent. Here's a closer look at how fileless malware work and what can be done to thwart them.
Nos prévisions en matière de sécurité pour l'année 2019 s'appuient sur l'analyse par nos experts de l'évolution des technologies actuelles et émergentes, du comportement des utilisateurs et des tendances du marché.
Nos prévisions en matière de sécurité pour l'année 2019 s'appuient sur l'analyse par nos experts de l'évolution des technologies actuelles et émergentes, du comportement des utilisateurs et des tendances du marché.
The average organization takes over 30 days to patch operating systems and software, and longer for more complex business applications and systems. This infographic shows how virtual patching solutions can help mitigate threats from vulnerabilities.
Security researchers further shed light on VPNFilter’s additional modules whose capabilities could’ve been used for future attacks, while a new IoT botnet has emerged - Torii.
Here’s a closer look at the challenges enterprises are confronted with when adopting a more robust cybersecurity strategy, and how managed detection and response can help address them.
Security researchers uncovered a new exploit kit, which they’ve named Fallout, delivering downloader trojans, potentially unwanted applications (PUAs), and notably the GandCrab ransomware.
New variants of Mirai and Gafgyt botnets were found targeting well-known vulnerabilities using multiple exploits directed at enterprises for possible DDoS attacks, including the flaw used in the 2017 Equifax data breach.