Implementing a smart and timely approach to patching remains one of the primary ways for organizations to protect their networks from attackers.
Hi, what are you looking for?
Implementing a smart and timely approach to patching remains one of the primary ways for organizations to protect their networks from attackers.
Cybercriminals are increasingly trying to find ways to get around security, detection, intelligence and controls as APTs start to merge with conventional cybercrime.
Sharing threat information and cooperating with other threat intelligence groups helps to strengthen customer safeguards and boosts the effectiveness of the cybersecurity sector overall.
Incorporating Red Zone threat intelligence into your security strategy will help you stay on top of the latest threats and better protect your organization.
A wave of layoffs, coupled with increased recruitment efforts by cybercriminals, could create the perfect conditions for insider threats to flourish
Many of the most successful cybercriminals are shrewd; they want good ROI, but they don’t want to have to reinvent the wheel to get...
Deepfakes are becoming increasingly popular with cybercriminals, and as these technologies become even easier to use, organizations must become even more vigilant.
No one combatting cybercrime knows everything, but everyone in the battle has some intelligence to contribute to the larger knowledge base.
As a result of the intersection of humans and technology, many social engineering attacks aimed at exploiting unsophisticated users are also likely to occur.
In the first half of this year, researchers saw a rising trend of wiper malware being deployed in parallel with the Russia-Ukraine war. However,...
When it comes to cybercriminals, defense evasion remains the top tactic globally. In fact, it was the most employed tactic by malware developers in...
As I pointed out earlier this year, Linux systems are a popular delivery mechanism for malware. While they’re not the most popular – that...
The rise of cryptocurrency has ushered in a new era of money laundering
Keep your response up to speed as attackers get faster
Malware and targeted attacks on operating systems and firmware have become increasingly destructive in nature, and these more nefarious attack methods are rising in...
Organizations need to secure, monitor and manage Linux just like any other endpoint in the network
Analyzing the attack goals of adversaries is important to be able to better align defenses against the speed of changing attack techniques. By focusing...
Protecting your organization against botnet threats requires a holistic, integrated approach to security
We’re barely into 2022, and already we’re seeing ransomware proliferate. What we saw last year is that while most attacks continue to exploit known...
Edge-Access Trojans (EATs) allow attackers to collect data and even disrupt crucial decisions as the edge of the network