Radio frequency (RF) technology is being used in operations to control various industrial machines. However, the lack of implemented security in RF communication protocols could lead to production sabotage, system control, and unauthorized access.
Fileless threats aren’t as visible compared to traditional malware and employ a variety of techniques to stay persistent. Here's a closer look at how fileless malware work and what can be done to thwart them.
Nasze prognozy związane z bezpieczeństwem na rok 2019 są oparte na analizach ekspertów w zakresie rozwoju bieżących i nowych technologii, zachowania użytkowników oraz trendów na rynku, a także ich wpływu na krajobraz zagrożeń.
Two Adobe Flash zero-day vulnerabilities using Microsoft documents are seen in an ongoing spam campaign. Users and enterprises using legacy systems are advised to patch immediately to prevent these critical flaws abused for possible attacks.
The FBI advised businesses to implement measures against Remote Desktop Protocol (RDP) brute force attacks. While considered a useful remote administration tool, cybercriminals also abuse it. Ways to defend against these threats.
The average organization takes over 30 days to patch operating systems and software, and longer for more complex business applications and systems. This infographic shows how virtual patching solutions can help mitigate threats from vulnerabilities.