March 20, 2018 Security Intelligence Briefing: Rise of the Triple Threat 2 min read - A new security intelligence report revealed that attackers are combining botnets, ransomware and phishing campaigns to create a triple threat that's hard to defeat and even harder to dislodge.
November 30, 2017 Older Office Cybersecurity Vulnerability Exploited by Cobalt Attackers 2 min read - Fraudsters have used the MS Office Equation Editor cybersecurity vulnerability to craft an attack on financial institutions and users.
Endpoint November 9, 2017 Making the Case for Containment With WIP 3 min read - When integrated with a UEM solution by default, Windows Information Protection (WIP) acts as its own container and maintains a native user experience.
October 31, 2017 Windows Vulnerability Puts NTLM Password Hashes at Risk 2 min read - A Colombian security researcher discovered a flaw that could enable attackers to steal Windows NTLM password hashes without any user interaction.
October 24, 2017 Locky Ransomware Attacks Exploit Microsoft DDE to Increase Effectiveness 2 min read - The cybercriminals behind Locky ransomware have adopted a new DDE hijacking technique to infect as many victims as possible while evading detection.
July 14, 2017 IT Managers Must Patch Security Vulnerabilities in Microsoft Windows 2 min read - Researchers uncovered two security vulnerabilities in Microsoft Windows that could put businesses at risk of credential forwarding and password cracking.
Malware June 27, 2017 Petya Weren’t Expecting This: Ransomware Takes Systems Hostage Across the Globe 6 min read - It appears that the current Petya payload is being distributed using the same exploits that were part of the leaks that powered the spread of WannaCry.
June 27, 2017 BlackTech Exploits Leaked Hacking Team Tools to Commit Cyber Espionage 2 min read - Security researchers linked three cyber espionage campaigns to a group that exploits leaked Hacking Team tools and flaws in outdated software.
June 27, 2017 GhostHook Attack Reveals Kernel-Level Threat in 64-Bit Windows Systems 2 min read - Researchers discovered a haunting technique they're calling a GhostHook attack, which uses a feature in Intel CPUs to take over 64-bit Windows.
June 26, 2017 Fireball Malware: Ticking Time Bomb or All Hot Air? 2 min read - Depending on who you ask, the Fireball malware infected somewhere between 40 and 250 million Windows devices. The potential danger, however, is undisputed.