December 4, 2019 Malware Campaign Uses Cobalt Strike and Trojanized Tetris App to Load PyXie RAT 2 min read - A new malware campaign is using Cobalt Strike and a trojanized Tetris app to target multiple industries with the PyXie RAT.
Intelligence & Analytics December 4, 2019 Save Time, Increase Efficiencies and Improve Security With a Modern SIEM 4 min read - SIEM solutions must evolve to keep up with the rapidly changing threat landscape, technological advancements and the growing attack surface.
December 3, 2019 Chrome Password Stealer CStealer Uses MongoDB to Store Collected Data 2 min read - A new Google Chrome password stealer called CStealer uses a remote MongoDB database to store the data it's collected.
Cloud Security December 2, 2019 Attain Embedded Cloud Security With a DevSecOps Approach 6 min read - A DevSecOps approach to cloud security can embed fast-paced, collaborative and iterative processes in cloud environments.
Risk Management November 26, 2019 Layer Up With a Layered Approach to Email Security This Winter 5 min read - Email security remains a top priority in 2019 and into the new year. Your best bet to fend off phishing attacks is to layer up with dynamic, data-driven protection.
November 25, 2019 Weekly Security News Roundup: Phoenix Keylogger Gaining Traction Among Cybercriminals 3 min read - Researchers revealed that the new Phoenix keylogger is steadily gaining traction among digital criminals on underground web forums. Learn what else happened last week in security news.
CISO November 22, 2019 Read This Before Making Your Case to Attend That Cybersecurity Conference 6 min read - How can you make the case for the value of attending a cybersecurity conference? How can you then bring that value back to your organization?
November 18, 2019 Attackers Use Custom Droppers to Install Agent Tesla, Lokibot Information Stealing Malware 2 min read - Researchers have spotted multiple malware campaigns using custom droppers to install information stealers onto victims' machines.
Endpoint November 12, 2019 How to Protect Your Organization From Evolving Phishing Attacks 4 min read - Protecting against evolving phishing attacks requires robust security awareness training for users and some help from technologies like artificial intelligence and ahead-of-threat detection.
CISO November 11, 2019 10 Differences Between Digital Transformation Leaders and Laggards 4 min read - Research shows that there are many differences between the best-of-class enterprises leading the way in digital transformation and their peers, who are falling behind.