Nozomi Networks, a company that provides real-time cybersecurity and operational visibility into Industrial Control Networks has comprised the top 5…
Browsing: Malware and Vulnerabilities
Ransomware / Malware Backups will not prove enough to stop ransomware as hackers find ways to subvert this strategy. – George…
When it comes to expectations around the necessity for securing and protecting customer data, the EU General Data Protection Regulation…
The distributed approach to cybercrime has forever changed the threat landscape. It was erected around a business model of maximising…
Multi-stage malware sneaks into Google Play Another set of malicious apps has made it into the official Android app store.…
News broke overnight of a new banking trojan, discovered by security experts and christened IcedID. The trojan appears to still be…
Microsoft has just released their patches for the month of November and Greg Wiseman, Rapid7’s Senior Security Researcher has provided his…
New human-centric security features bring together cloud access, data protection and network security capabilities to identify, adapt and respond to…
Security researchers have discovered an exploit within an Antivirus software that takes advantage of the “restore from quarantine” function and allows a…
Private Browsing (referred to as InPrivate in Internet Explorer, Private Browsing in Mozilla Firefox, and Incognito mode in Google Chrome)…