Data Protection May 7, 2018 If Video Killed the Radio, Will Malvertising Kill Your Website? 3 min read - Malvertising isn't just a nuisance for internet users — it puts businesses and their customers at risk and compromises the integrity of the online advertising ecosystem.
May 2, 2018 Two-Thirds of IT Professionals Believe Their Endpoint Security Tools Won’t Prevent a Major Malware Attack 2 min read - According to a recent survey, two-thirds of security professionals believe their endpoint security tools are insufficient to protect their organizations from malware.
Fraud Protection May 1, 2018 Analyzing PDF and Office Documents Delivered Via Malspam 6 min read - Endpoint detection and antiphishing tools can help users filter basic spam email, but detecting malspam in PDF and Microsoft Office documents requires a more thorough investigation.
Data Protection April 25, 2018 Protecting Your Employees’ Home IT From Cyberthreats 3 min read - Helping employees protect their home IT reduces enterprise security risks and helps security leaders better safeguard corporate data.
April 24, 2018 New Orangeworm Threat Group Targets Healthcare Organizations With Custom Backdoor 2 min read - Security researchers reported that a cybergang known as Orangeworm is actively targeting healthcare organizations and attempting to install a custom backdoor on their networks.
April 24, 2018 Cybercrime Profits Soar to $1.5 Trillion 2 min read - According to a recent study, malicious actors and threat groups are generating, spending and reinvesting $1.5 trillion worth of cybercrime profits.
Artificial Intelligence April 24, 2018 Anti-I: The Future of AI-Generated Malware 3 min read - As AI progresses, security professionals must prepare for the inevitability of machines writing their own malware to infect other machines in the not-so-distant future.
April 23, 2018 Human-Centered Vulnerabilities Now Outpace Automated Cyberattacks 2 min read - According to a new report, cybercriminals now prefer to leverage human-centered vulnerabilities rather than launching automated attacks.
Incident Response April 23, 2018 How to Choose the Right Malware Classification Scheme to Improve Incident Response 6 min read - Analysts can improve and automate their incident response processes by adopting the right malware classification scheme according to specific threat management goals.
Banking & Finance April 18, 2018 Q1 2018 Results: Gozi (Ursnif) Takes Larger Piece of the Pie and Distributes IcedID 3 min read - Gozi took a larger slice of the financial malware pie and become the most active banking Trojan in 2017, according to the IBM X-Force Threat Intelligence Index 2018.