By understanding the basics of DNS analytics, the common methods of attack and the tools available to security teams, you will be better prepared to protect your enterprise from hidden cyberthreats.
One of the best ways for cybercriminals to deliver a payload on your organization's network is to smuggle it inside your employees' mobile apps.
Researchers uncovered an adaptable Android Trojan known as GPlayed that masquerades as Google Apps to spy on and steal information from victims.
Covert data exfiltration techniques can be perfected with the help of 10 commandments, which were recently laid out by researchers.
Data exfiltration techniques are getting more sophisticated. How do companies protect their interests against attackers who are willing to get creative?
The IBM Security X-Force Research team has uncovered a serious vulnerability that affects many Android applications built on the Apache Cordova platform.
Maintaining the security of POS systems is a growing concern: The Dexter malware has been found to target customers' payment information.