What is ransomware? In short, it's malware that encrypts your data and demands a ransom fee for its supposed safe return. The best defense against this threat is to keep it off the network altogether.
As an IT managed service provider (MSP), you can help clients save money by providing a high-value endpoint security service that closes the visibility gap.
New Gartner Report Recommends a Vulnerability Management Process Based on Weaponization and Asset Value
Gartner's new report recommends factoring severity, asset value and active exploits into your vulnerability management process.
The volume of CVE data is rapidly growing, and security teams need continuous visibility into their assets and associated risks to stay on top of emerging threats.
A new router attack targeting MikroTik devices exploits a Winbox bug to install CoinHive malware and create backdoors.
According to new research, exploit kit creators have been targeting some of the oldest and most common software flaws — even as the cyberthreat landscape shifts to more sophisticated attack vectors.
In the process of fixing a flaw discovered in March 2018, security researchers from Drupal discovered another vulnerability that could enable threat actors to deliver cryptocurrency mining malware.
A recent ransomware attack against a Missouri hospital showed that healthcare organizations are still under threat despite an overall decline in campaigns across industries.
Despite an overall shift away from traditional ransomware in favor of crypto-mining malware, research shows that ransomware is still alive and well in the form of highly targeted attacks.
The first quarter of 2018 saw a rise in cybersecurity threats such as ransomware, Internet of Things (IoT) vulnerabilities and zero-day threats.