• PAGES:
  • 1
  • 2
  • October 19, 2023
    We discuss proof-of-concept rootkits and malware used by cybercriminals in conjunction with Berkeley Packet Filtering (BPF), a piece of technology that allows programs to execute code in the operating systems of popular cloud-computing platforms. We also show how to detect such threats.
  • August 10, 2023
    In this first installment in our series on the challenges of the cybersecurity industry, we explore the underlying causes of the workforce gaps that have long plagued SOC teams.
  • March 06, 2020
    Our continuous surveillance and research of the threat landscape in 2023 showed patterns suggesting that as cybercriminals take advantage of the expanding attack surface, they are also learning to prioritize substance over size.
  • PAGES:
  • 1
  • 2