December 11, 2019 HawkEye Keylogger Acts as First-Stage Loader for Cryptocurrency Miner 2 min read - Researchers observed the HawkEye keylogger acting as the first-stage downloader for a cryptocurrency miner in a new phishing campaign.
Banking & Finance December 11, 2019 What Are the Risks of the IoT in Financial Services? 4 min read - The nature of financial business means that both the promise and the risks of the IoT in financial services are great.
Identity & Access December 10, 2019 3 Ways to Supercharge Identity and Access Management 3 min read - Adaptive access, identity analytics and decentralized identity strategies can all help organizations modernize their identity and access management programs.
December 4, 2019 Malware Campaign Uses Cobalt Strike and Trojanized Tetris App to Load PyXie RAT 2 min read - A new malware campaign is using Cobalt Strike and a trojanized Tetris app to target multiple industries with the PyXie RAT.
Intelligence & Analytics December 4, 2019 Save Time, Increase Efficiencies and Improve Security With a Modern SIEM 4 min read - SIEM solutions must evolve to keep up with the rapidly changing threat landscape, technological advancements and the growing attack surface.
December 3, 2019 Chrome Password Stealer CStealer Uses MongoDB to Store Collected Data 2 min read - A new Google Chrome password stealer called CStealer uses a remote MongoDB database to store the data it's collected.
Cloud Security December 2, 2019 Attain Embedded Cloud Security With a DevSecOps Approach 6 min read - A DevSecOps approach to cloud security can embed fast-paced, collaborative and iterative processes in cloud environments.
Risk Management November 26, 2019 Layer Up With a Layered Approach to Email Security This Winter 5 min read - Email security remains a top priority in 2019 and into the new year. Your best bet to fend off phishing attacks is to layer up with dynamic, data-driven protection.
November 25, 2019 Weekly Security News Roundup: Phoenix Keylogger Gaining Traction Among Cybercriminals 3 min read - Researchers revealed that the new Phoenix keylogger is steadily gaining traction among digital criminals on underground web forums. Learn what else happened last week in security news.
CISO November 22, 2019 Read This Before Making Your Case to Attend That Cybersecurity Conference 6 min read - How can you make the case for the value of attending a cybersecurity conference? How can you then bring that value back to your organization?