Threat sharing is getting more and more attention from security professionals to detect and quickly respond to security threats.
A new type of ransomware called Kofer poses a severe threat to Internet users on a global scale, but it's just the tip of the malware iceberg.
Two researchers at the CanSecWest conference showed how the LightEater malware could infect the BIOS in most hardware to take over systems and steal data.
Cybercriminals using similar lexical styles when establishing domains to phish from allow analysts to spot them via natural language processing techniques.
Kicking off 2015 with a bang, a well-orchestrated advanced persistent threat attack dubbed Carbanak has hit banks across the globe.
A new variant of the Dyre Trojan, a type of massively distributed malware, is being used to attack victims using Microsoft Outlook in APT-style attacks.
Whether titans of industries or the hot new players, all areas of the business spectrum are coming under security scrutiny by attackers and customers.
A malicious hacking crew, possibly based out of South Korea, has been quietly stealing data from high-level hotel guests with the Darkhotel malware.
With all the security breaches, it seems like cybercriminals keep getting through. Malware is evolving to evade detection by traditional defenses.
If your organization is being attacked, your network security should be equipped and empowered to protect it instantly or you risk damage to your system.