January 14, 2019 University of Maryland Researchers Use Audio Files and AI to Defeat reCaptcha Challenges 2 min read - University of Maryland researchers warn that with limited resources, threat actors could launch a successful cyberattack on Google's bot-detecting reCaptcha service.
January 8, 2019 NRSMiner Crypto-Mining Malware Infects Asian Devices With the Help of EternalBlue Exploit 2 min read - Security researchers report that the newest version of NRSMiner crypto-mining malware is causing problems for companies that haven't patched the EternalBlue exploit.
January 4, 2019 Ursnif, Emotet, Dridex and BitPaymer Malware Families Team Up to Wreak Havoc 2 min read - Researchers discovered a link between four malware families — Ursnif, Emotet, Dridex and BitPaymer — that suggests threat actors may be combining efforts to develop more sophisticated attack vectors.
CISO January 4, 2019 Your Security Strategy Is Only as Strong as Your Cyber Hygiene 3 min read - Without full network visibility and regular utilization of cyber hygiene best practices, your enterprise could face very real, but entirely preventable, security risks.
Government January 3, 2019 Government Cybersecurity Processes Must Change Drastically to Keep Up With Complex Attack Vectors 3 min read - Since governments have so many potential attack vectors to manage, government cybersecurity professionals need clear processes, procedures and authority to harden vulnerable environments.
Intelligence & Analytics December 12, 2018 Think Your Network Is Safe? If You Don’t Have Visibility Into Hardware Vulnerabilities, Think Again 2 min read - Even organizations that rigorously patch software flaws are exposed to a growing range of cyberthreats if they lack visibility into hardware vulnerabilities.
November 15, 2018 Threat Actors Exploit Equation Editor to Distribute Hawkeye Keylogger 2 min read - A recent Hawkeye keylogger campaign leveraged an old Microsoft Office Equation Editor vulnerability to steal user credentials, passwords and clipboard content.
November 14, 2018 Canadian University Shuts Down Network in Response to Cryptocurrency Mining Attack 2 min read - A Canadian university had to take critical IT systems offline after security professionals identified an attack designed to mine cryptocurrency using the school's computing resources.
Endpoint November 7, 2018 How to Reduce Hidden Endpoint Management Costs and Increase Efficiency 5 min read - To reduce hidden endpoint management costs, look for solutions that give you comprehensive visibility into your endpoint landscape and enable you to consolidate tools and increase efficiency.
CISO October 23, 2018 6 Common Myths That Could Be Holding Back Your Cybersecurity Awareness Efforts 4 min read - To improve the company's overall cyber resilience posture, security leaders must promote a culture of cybersecurity awareness from the top down. They can start by debunking these six common myths.