Researchers from FortiGuard Labs discovered a malware sample called iTranslator that installs two drivers onto infected machines to perform man-in-the-middle (MitM) attacks.
Since the open source release of the PowerShell framework in 2016, IBM X-Force Incident Response and Intelligence Services (IRIS) has identified an upward trend in malicious PowerShell use.
To move toward deep, advanced security analytics, CISOs should replace their fragmented tools with a platform-based approach that can leverage a broad set of data.
With many organizations now dependent on iOS devices, security leaders must balance productivity and security with the right endpoint management solution.
While massive data breaches typically hog all the cybersecurity headlines, SMB security is also at risk as cybercriminals go after easy targets with low IT budgets.
As the workforce has embraced digital transformation, the volume and frequency of mobile threats has skyrocketed. Which threats should your organization be worried about?
As an IT managed service provider (MSP), you can help clients save money by providing a high-value endpoint security service that closes the visibility gap.
Social media scams are an ever-evolving way for criminals to abuse the exponentially connected applications that are increasingly saturating users' everyday lives.
Security researchers observed CactusTorch, a fileless malware, using a .NET executable to run harmful .NET assemblies from memory.
Enterprise data and devices require additional safeguarding wherever your employee takes them — especially on vacation. Some basic user education can greatly reduce security risk.