File sync and share (FSS) services are designed to foster collaboration and communication among employees and increase productivity. File sync…
Browsing: Malware and Vulnerabilities
Introduction: Zscaler ThreatLabZ recently came across a new wave of malicious documents evading automated analysis systems using a new technique.…
Endpoint hunting identifies active and dormant malware missed by security monitoring, drastically reducing the breach detection gap and strengthening defense-in-depth…
To protect their privacy, paranoid users are turning to a multitude of different methods to keep their personal data away…
Following the news that the Russian seller, who goes by the name Tessa88, claimed in an encrypted chat on Tuesday to have…
In light of the recent discovery that the University of Calgary paid $20,000 to regain access to its data after a ransomware…
A day doesn’t go by without finding out about another corporate cyber breach that has resulted in the loss of…
It has been two weeks since ESET found out that TeslaCrypt ransomware closed down its operations. Since then, there is…
~New Citrix research reveals one in five large companies do not have any contingency measures in place in case of…
The proliferation of cyber threats against UK enterprises has resulted in the British government demanding organisations do more to protect…