Posted on 4th August 2019
While the password-cracking Mimikatz took top honors, Mac-targeted malware accounted for two of the 10 most detected malware samples, according to WatchGuard.
Malware targeting Apple's Mac operating system...
Posted on 30th July 2019
No longer can you secure the perimeter or a centralized core and trust that nothing will get in or out. Effective security depends on an in-depth strategy - from the core to the edge.
Posted on 23rd July 2019
Article by Kacy Zurkus, DarkReading
Of particular interest for cybercriminals is the Domain Name System, which plays a central role in orchestrating all Internet and application traffic.
Security teams are...
Posted on 21st July 2019
Article by Jake Moore, at WeLiveSecurity
You’ve likely seen a list of top 25 passwords that get reused time and time again – “password” is a usual suspect – but what about phone...
Posted on 16th July 2019
Article by Jai Vijayan, News at DarkReading
Threat actors increasingly using malicious URLs, HTTPS domains, file-sharing sites in email attacks, FireEye says.
Email continues to be an extremely effective vector for delivering...
Posted on 9th July 2019
Article by Joan Goodchild, Malwarebytes Labs There is a saying in security that the bad guys are always one step ahead of defense. Two new sets of research reveal that the constant cat-and-a mouse game is wearing on security professionals, and...
Posted on 7th July 2019
Article by Kelly Sheridan, Dark Reading
Email security challenges CISOs as cybercriminals target corporate inboxes with malware, phishing attempts, and various forms of fraud.
Employee email accounts are prime targets for fraudsters,...