April 7, 2020 Kinsing Malware Hits Container API Ports With Thousands of Attacks per Day 2 min read - A misconfigured API port led to a months-long campaign in which cybercriminals have been launching daily Kinsing malware attacks that number in the thousands, according to security researchers.
Fraud Protection April 1, 2020 Breaking the Ice: A Deep Dive Into the IcedID Banking Trojan’s New Major Version Release 14 min read - Since 2017, the IcedID Trojan has received consistent updates that enable it to continue targeting banks and other businesses. Find out what changes were included in the latest major release.
Artificial Intelligence March 27, 2020 Why Adversarial Examples Are Such a Dangerous Threat to Deep Learning 4 min read - Adversarial examples can throw a wrench in deep learning processes and expose vulnerabilities. Organizations should take steps now to get ahead of these threats before they disrupt data processes.
Intelligence & Analytics March 25, 2020 Recalibrate Insider Threat Controls for a Newly Remote Workforce 3 min read - With the rise of the remote workforce, CISOs need to shift focus from corporate networks to protect against insider threats and risks beyond the traditional perimeter. Here's what to consider.
Data Protection March 20, 2020 7 Spring Cleaning Tasks to Improve Data Security 4 min read - Data security is a daily essential, but spring cleaning offers an opportunity to check in on your current practices and make changes where necessary.
CISO March 20, 2020 4 Principles That Should Define Your Evolving Security Operations Model 3 min read - It's never too soon to set the stage for your next-generation security operations model. Here are four important considerations to keep in mind.
Identity & Access March 19, 2020 How CIAM Addresses the Challenges of Consumer Identity Management 4 min read - A consumer identity and access management (CIAM) solution can help enable secure, personalized, omnichannel interactions between consumers and brands.
March 18, 2020 Snoop Attacks via L1 Data Sampling Threaten Security of Intel CPUs 2 min read - Intel processors, including Core and Xeon products, are susceptible to attacks described as Snoop-assisted L1 data sampling, a security investigator has discovered.
March 17, 2020 Varied Functionality of MonitorMinor App Outstrips All Other Mobile Stalkerware 2 min read - Security researchers observed that the MonitorMinor app outstrips the capabilities of all other mobile stalkerware strains detected thus far.
Fraud Protection March 17, 2020 2020 Tax Fraud Trends: How to Protect Yourself at Home and Work 8 min read - Scammers view tax season as a prime recruiting season for victims. Here are the most prominent tax fraud trends in 2020 and how to protect your identity and business from risks.