We think of cyber criminals as sitting in basements, plotting to subvert technology by breaking through the firewall, but the reality is that the problem is a human one. Technology is actually quite effective at withstanding attacks, so the attackers target the most vulnerable spot – the user.
COVID-19, 5G, increasing threat complexity, scrubbing services and other trends are catalysts for new defence models to keep digital business always connected.
Check Point Research, the Threat Intelligence arm of Check Point Software Technologies Ltd, a leading provider of cyber security solutions …
Sophos Uncovers New Delivery and Evasion Techniques Used By Agent Tesla to Bypass Security.
Cybereason Uncovers New Malware Arsenal Abusing Facebook and Dropbox in Middle East Espionage Campaign
Kaspersky Fraud Prevention has enabled a financial services company to reduce fraud losses by as much as $3.4 million over three years.
Proofpoint has announced a new Proofpoint Essentials Security Awareness solution to help small and medium sized businesses (SMBs) identify top …
When you find any of these five indicators during an investigation it is almost certain that attackers have poked around to learn how they can to launch a ransomware attack.
Garmin was attacked by the Trojan WastedLocker—ransomware that has become noticeably more active since the first half of this year.
McAfee has released its McAfee COVID-19 Threat Report: July 2020 examining cybercriminal activity related to COVID-19 and the evolution of cyber threats in Q1 2020.