Data Protection February 8, 2019 Employees Are Working From Home — Do You Know Where Your Remote Work Policy Is? 3 min read - A good remote work policy covers a broad range of categories, from employment rules to expense reporting to legal obligations. But the data security provisions are probably the most important.
December 20, 2018 Threat Actors Utilize Spear Phishing Emails Impersonating US Department of State Employees 2 min read - Microsoft Windows Defender Research discovered an attack campaign that utilized spear phishing emails impersonating U.S. Department of State employees to gain remote access to victims' machines.
Malware November 8, 2017 Overlay RAT Malware Uses AutoIt Scripting to Bypass Antivirus Detection 6 min read - IBM X-Force discovered a new overlay RAT malware that exploits the AutoIt framework to evade antivirus detection while perpetrating bank fraud in Brazil.
Intelligence & Analytics September 1, 2017 Analyze Attack Patterns to Make Your Environment Secure by Design 2 min read - By analyzing attack patterns and making their environments secure by design, analysts can control devices remotely without impeding change management.
August 24, 2017 Cybercriminals Could Easily Take Over Industrial Cobots, Researchers Warn 2 min read - Security researchers discovered more than 50 vulnerabilities in industrial cobots that could allow cybercriminals to change safety settings from afar.
April 26, 2017 Stealthy Remote Access Trojan Resurfaces 2 min read - A remote access Trojan remained undetected for several years due to its unconventional operating methods. Here's what to know about the Cardinal RAT.
Endpoint April 20, 2017 UEM’s Most Wanted: Deliver Remote Support to Any Endpoint From Anywhere 2 min read - When integrated with TeamViewer, MaaS360 UEM equips administrators with the visibility and control they need to provide remote support to end users.
January 23, 2017 Bot Chatter: Ragebot Botnet Malware Morphs 2 min read - The botnet malware known as Ragebot, which notably uses IRC to control infected devices, has resurfaced with improved features.