As another year ends, it's time to review your cybersecurity practices from the past year. How can you improve your security posture in 2019?
Security researchers observed the Sednit threat group distributing Zebrocy malware using a Delphi dropper and mail downloader.
Security researchers identified a malspam campaign targeting Italian users with a variant of the sLoad downloader.
Security researchers revealed that two mobile malware threats, Xloader and FakeSpy, may have been developed and launched by the same cybercriminal group.
Hot topics of conversation around European Cyber Security Month (ECSM) included the challenges and opportunities of cybersecurity, the blurred line between the good guys and bad actors, and more.
The Sofacy group recently targeted several government organizations around the world with the new Cannon Trojan.
NIST has changed its long-standing recommendations for password management, favoring minimal user friction over complexity requirements and regular password updates.
When he's not helping clients stay on top of cloud security, Andi Hudson is reaching out to schools to spread awareness about careers in technology and the importance of data privacy.
Financial institutions seeking a piece of the hot P2P payments market must act to prevent network fraud with a multilayered prevention approach that includes a robust fraud detection engine.
EU companies are far ahead of their U.S. counterparts in terms of adopting IT and security trends, according to recent research.