A good remote work policy covers a broad range of categories, from employment rules to expense reporting to legal obligations. But the data security provisions are probably the most important.
Microsoft Windows Defender Research discovered an attack campaign that utilized spear phishing emails impersonating U.S. Department of State employees to gain remote access to victims' machines.
IBM X-Force discovered a new overlay RAT malware that exploits the AutoIt framework to evade antivirus detection while perpetrating bank fraud in Brazil.
By analyzing attack patterns and making their environments secure by design, analysts can control devices remotely without impeding change management.
Security researchers discovered more than 50 vulnerabilities in industrial cobots that could allow cybercriminals to change safety settings from afar.
A remote access Trojan remained undetected for several years due to its unconventional operating methods. Here's what to know about the Cardinal RAT.
When integrated with TeamViewer, MaaS360 UEM equips administrators with the visibility and control they need to provide remote support to end users.
The botnet malware known as Ragebot, which notably uses IRC to control infected devices, has resurfaced with improved features.