IoT and Zero Trust Are Incompatible? Just the Opposite VP of Cybersecurity
IoT is a big security headache for a lot of reasons. So how can these be part of a Zero Trust architecture? Read More HERE…
IoT is a big security headache for a lot of reasons. So how can these be part of a Zero Trust architecture? Read More HERE…
We recently spotted fake installers of popular software being used to deliver bundles of malware onto victims’ devices. These installers are widely used lures that trick users into opening malicious documents or installing unwanted applications. Read More HERE…
Water Basilik Uses New HCrypt Variant to Flood Victims With RAT Payloads & Biden Administration Issues Sanctions To Counter Ransomware Read More HERE…
In this entry, we look at the techniques typically employed by the Cring ransomware, as well as the most affected regions and industries. Read More HERE…
Level-up your skills and uncover what’s next for cloud by registering for the virtual Google Cloud Next conference starting Oct. 12, 2021. Read More HERE…
We look at the most pertinent cybersecurity issues organizations across the globe faced in the first half of 2021. Read More HERE…
Recently, we discovered that the cryptomining trojan z0Miner has been taking advantage of the Atlassian’s Confluence remote code execution (RCE) vulnerability assigned as CVE-2021-26084, which was disclosed by Atlassian in August. Read More HERE…
Trend Micro’s Next-Generation IPS protects organizations from threats as attackers now target remote work-related vulnerabilities. Read More HERE…
Explore the three risks that open source code scanning can mitigate, allowing SecOps and DevOps teams to bridge the gap for more secure application building. Read More HERE…
In this blog entry we look into a fileless campaign that used a new HCrypt variant to distribute numerous remote access trojans (RATs) in victim systems. This new variant also uses an updated obfuscation mechanism which we detail. Read More HERE…