Security News
The China-linked threat actor known as APT15 has been using a previously undocumented backdoor for more than two years, ESET’s security researchers have discovered. read more
The French army is going to put together a team of science fiction writers to help imagine future threats. Leaving aside the question of whether science fiction writers are better or worse at...
How long does it takes for Internet-facing, RDP-enabled computers to come under attack? In some cases, a few minutes. In most, less than 24 hours. The problem with RDP “In recent years, criminals...
Much like deep & dark web (DDW) coverage and anti-fraud solutions, request for intelligence (RFI) services have quickly become both ubiquitous and prone to misleading claims in the threat...
Detecting and preventing call center fraud embodies many of the same challenges associated with fighting insider threats.
Ransomware targeting organizations is a growing threat. The extent of that threat is not always obvious. Except for the healthcare sector, disclosure of a ransomware attack is not generally...
Safeguarding enterprise assets is no longer just about protecting endpoints from malware, spam and phishing.
Claroty, the global leader in industrial cybersecurity, introduced several enhancements to Continuous Threat Detection (CTD), its award-winning operational technology (OT) security solution. The...
CyberGRX, provider of the world’s first and largest global cyber risk exchange, announced the recent release of a groundbreaking new feature that provides users with immediate visibility into...