Social media scams are an ever-evolving way for criminals to abuse the exponentially connected applications that are increasingly saturating users' everyday lives.
Security researchers observed CactusTorch, a fileless malware, using a .NET executable to run harmful .NET assemblies from memory.
Enterprise data and devices require additional safeguarding wherever your employee takes them — especially on vacation. Some basic user education can greatly reduce security risk.
Instead of seeking financial gains with ransom demands, threat actors are now aiming to steal central processing unit (CPU) and graphics processing unit (GPU) resources to facilitate cryptojacking.
Despite an overall shift away from traditional ransomware in favor of crypto-mining malware, research shows that ransomware is still alive and well in the form of highly targeted attacks.
As the workforce embraces mobility to increase productivity, organizations must adopt a more innovative, dynamic approach to mobile threat defense.
As the threat landscape evolves to target connected devices, artificial intelligence (AI) and machine learning will become increasingly crucial parts of any organization's endpoint security strategy.
Corporate VPN security still plays a vital role in protecting enterprise networks, but it is no longer sufficient to prevent unauthorized third-party or privileged access on its own.
Unified endpoint management (UEM) delivers on the promise of bringing a vast range of endpoints and enterprise use cases under one management console.
When Lincoln Healthcare experiences a watering hole attack, security operations center (SOC) director Malcolm Gerhard is tasked with developing a swift cybersecurity incident response. Will he succeed?