Attend this webinar to learn how to leverage findings based on actual cybercrime attacks detected during real-time analysis and interdiction of fraudulent account logins, online payments and registrations.
Sony Pictures apologized for racially insensitive remarks about President Barack Obama in company emails, including an email in which Sony co-chairwoman Amy Pascal asks film producer Scott Rudin what she should ask Obama at a "stupid" fundraising breakfast.
Nearly two years after the Red October cyber espionage operation was exposed, researchers have spotted a new advanced persistent threat (APT) campaign that appears to represent the return of the Red October group.
Electronic payment gateway solutions provider CHARGE Anywhere, LLC said on Tuesday that an attack against its network resulted in hackers gaining access to payment card data for transactions processed through many merchants.
In the same way we have watched APT techniques trickle down from nation-state actors to more opportunistic criminals, we should expect MitB to expand from financial services to all types of applications.
While attackers are constantly improving their evasion tactics to extend the lifetime of their malware, users can also leverage these types of evasion tactics to help prevent malware infection in the first place.
Many continue to click on links or attachments sent via email without taking any steps to verify the origin of the email or the validity of the link or attachment. It only takes one click to for an attacker to establish a foothold in the target’s systems.
Trying to defend against modern, advanced attacks with one-off point solutions is like playing a whack-a-mole game, always one step behind the attacker and trying to play catch up with the alerts as they’re received.