Many attackers are switching from file-based malware to memory-based attacks to improve their stealth. “Fileless,” “zero-footprint,” or “living off the land” threats use legitimate applications to carry out malicious activities.
There has been an influx of employees signing in remotely to corporate networks and using cloud-based applications. But this shift could also open doors to security risks. Where should security fit in?
A zero-day attack exploits an unpatched vulnerability. Until a patch becomes available, it is often a race between threat actors trying to exploit the flaw and vendors or developers rolling out a patch to fix it.
Fileless threats aren’t as visible compared to traditional malware and employ a variety of techniques to stay persistent. Here's a closer look at how fileless malware work and what can be done to thwart them.
The WEP and WPA2 wireless security protocols have both been discovered with vulnerabilities such as KRACK that hackers can exploit to compromise devices, spy on users, and perform other malicious activities. How can users secure their wireless connections?
The Federal Bureau of Investigation (FBI) released a public service announcement earlier this year warning about Business Email Compromise (BEC) schemes. Here’s what you need to know, and what you can do to prevent attacks.