As Microsoft has released their patches for the month of June, Adam Nowak, Rapid7 Active Lead Engineer at Rapid7, has provided his commentary…
Browsing: Malware and Vulnerabilities
Following the news that Flocker Android Ransomware is now infecting Smart TVs, experts from PRPL Foundation, Imperva, Proofpoint and MIRACL, commented below.…
The losses being reported for recent bank cyberattacks are frighteningly large– banking cybercrime in 2016 most definitely pays. Things used…
Large Italian utility provider uses 1200R security appliance to enhance visibility and control of SCADA networks Check Point® Software Technologies…
File sync and share (FSS) services are designed to foster collaboration and communication among employees and increase productivity. File sync…
Introduction: Zscaler ThreatLabZ recently came across a new wave of malicious documents evading automated analysis systems using a new technique.…
Endpoint hunting identifies active and dormant malware missed by security monitoring, drastically reducing the breach detection gap and strengthening defense-in-depth…
To protect their privacy, paranoid users are turning to a multitude of different methods to keep their personal data away…
Following the news that the Russian seller, who goes by the name Tessa88, claimed in an encrypted chat on Tuesday to have…
In light of the recent discovery that the University of Calgary paid $20,000 to regain access to its data after a ransomware…