A wave of layoffs, coupled with increased recruitment efforts by cybercriminals, could create the perfect conditions for insider threats to flourish
Hi, what are you looking for?
A wave of layoffs, coupled with increased recruitment efforts by cybercriminals, could create the perfect conditions for insider threats to flourish
Many of the most successful cybercriminals are shrewd; they want good ROI, but they don’t want to have to reinvent the wheel to get...
Deepfakes are becoming increasingly popular with cybercriminals, and as these technologies become even easier to use, organizations must become even more vigilant.
No one combatting cybercrime knows everything, but everyone in the battle has some intelligence to contribute to the larger knowledge base.
As a result of the intersection of humans and technology, many social engineering attacks aimed at exploiting unsophisticated users are also likely to occur.
In the first half of this year, researchers saw a rising trend of wiper malware being deployed in parallel with the Russia-Ukraine war. However,...
When it comes to cybercriminals, defense evasion remains the top tactic globally. In fact, it was the most employed tactic by malware developers in...
As I pointed out earlier this year, Linux systems are a popular delivery mechanism for malware. While they’re not the most popular – that...
The rise of cryptocurrency has ushered in a new era of money laundering
Keep your response up to speed as attackers get faster
Malware and targeted attacks on operating systems and firmware have become increasingly destructive in nature, and these more nefarious attack methods are rising in...
Organizations need to secure, monitor and manage Linux just like any other endpoint in the network