Many work-from-home employees use devices for personal and business purposes in home networks that are not as secure as that of the office. This article discusses the threats to unsecure IoT apps and provides ways to secure them.
The big move to the cloud has already happened for majority of enterprises and organizations who are invested in providing unhampered, future-proof services. But how can they prioritize visibility in a cloud-first world?
We take a closer look at an emerging underground market that is driven by malicious actors who sell access to a gargantuan amount of stolen data, frequently advertised in the underground as “cloud of logs."
A watering hole campaign we dubbed as Operation Earth Kitsune is spying on users’ systems through compromised websites. Using SLUB and two new malware variants, the attacks exploit vulnerabilities including those of Google Chrome and Internet Explorer.