As we get to the end of a busy year for cybersecurity, Unit 42 threat research team at Palo Alto…
Browsing: Phishing
Orchestration and Automation In 2018, cybersecurity orchestration and automation will increase in both relevance and adoption. This will be driven…
Breaking news has revealed that both US and UK governments are placing the blame on North Korea for being behind…
A vulnerability in Windows that has been around for decades is being exploited by hackers behind a new version of…
It’s being reported that hackers have been using credit card stealing malware to infect popular retailers such as Zara just as the…
The Hacker’s Playbook Findings Report* reveals that cybercriminals are able to break into enterprise networks with malware on average 60%…
AI will supercharge phishing attacks AI won’t just be used by the good guys. In 2018, we will start to…
Wide spread cryptocurrency mining Cryptocurrency mining will become one of the major monetisation avenues for attackers as more and more…
Security blossoms in the boardroom Sadly, security breaches will continue to be a regular occurrence in 2018 and organisations will…
F5 Labs today released a new report, Lessons Learned from a Decade of Breaches, which researches 429 breach cases spanning 12 years, 37…