Following news reports that the Democratic Congressional Campaign Committee (DCCC) was breached via a spoofed donation website, the ThreatConnect Research team and Fidelis Cybersecurity teamed up…
Browsing: Malware and Vulnerabilities
Following the news that Iranian security researchers finding vulnerability in Telegram’s SMS authentication. Mark Loveless, Senior Security Researcher with Duo Labs commented…
LAS VEGAS, Nevada. Imperva, Inc. (NYSE: IMPV), committed to protecting business-critical data and applications in the cloud and on-premises, today released its…
Organisations have latched on to the need to secure SIP trunking solutions by implementing a Session Border Controller (SBC). The…
New SandBlast Agent for Browsers plug-in prevents the latest web-based malware, phishing and credential theft attacks using cloud-based analysis Check Point has…
It hasn’t come exactly as a bolt from the blue, but even longtime security practitioners have been taken aback by…
I see this in many of the enterprises we meet. It comes up from CISO as an issue any time discussing our…
Following Cisco’s 2016 Midyear Cybersecurity Report shining a spotlight on ransomware and drawing attention to the importance of improving ransomware detection or…
When it comes to encryption, there are usually two perspectives in any organization outside of IT or infosec. Those who…
It’s a well-known fact that nation states have almost unlimited cyber powers. Nation states with unlimited military resources, technical know-how and political…