As of 2018, global losses to BEC have exceeded US$12 billion. To keep abreast of the landscape that scammers are operating in, we look back on some of the noteworthy incidents and trends that made BEC a headline staple this year.
What would happen if a VPN doesn’t do what it’s intended to do — which is to deliver an anonymous and secure way for users to go online? This is what we sought to uncover in our research on HolaVPN and its sister company Luminati.
A pivotal change to adapt to technological advances like smart factories requires a huge budget, and one critical consideration is how to get the most value out of that investment. Integrators can begin by reevaluating their security.
Two Adobe Flash zero-day vulnerabilities using Microsoft documents are seen in an ongoing spam campaign. Users and enterprises using legacy systems are advised to patch immediately to prevent these critical flaws abused for possible attacks.
We looked into MQTT brokers and CoAP servers around the world to assess IoT protocol security. Learn how to prevent risks and secure machine-to-machine (M2M) communications over MQTT and CoAP in our research.
We discovered a spam campaign that uses .PUB as a macro-downloader targeting the financial, food and retail industries. The combination with detection evasion makes this malware unique and more dangerous, especially during the busiest time of the year for busi