Data Protection May 8, 2020 Develop Tailored Cybersecurity Self-Assessments to Help Secure Your Remote Workforce 4 min read - Promote security awareness among your remote workforce and inform future training efforts by distributing tailored cybersecurity self-assessments to your employees.
Cloud Security May 7, 2020 Support Remote Workforce Productivity With Secure Cloud Services 3 min read - The remote workforce has become increasingly mainstream around the world, but this model depends on thorough cloud security to ensure business operations can continue.
May 6, 2020 New ‘Kaiji’ Linux Malware Targeting IoT Devices 2 min read - A new Linux malware strain known as "Kaiji" is targeting internet of things (IoT) devices via SSH brute-force attacks.
May 5, 2020 LockBit Ransomware Performs Targeted Attacks With Automated Distribution 2 min read - Security researchers observed the LockBit ransomware leveraging brute-force techniques and evasion-based tactics to perform targeted attacks.
May 4, 2020 Vulnerabilities in LMS Plugins Allow Students to Access Records, Edit Data < 1 min read - Security researchers discovered that students could abuse vulnerabilities in certain LMS plugins to access records and edit data.
Artificial Intelligence May 4, 2020 6 Things to Do After Implementing Cybersecurity AI for Alert Management 4 min read - Once cybersecurity AI automates threat monitoring tasks, what should infosec pros do next? Here are six ways to improve your post-AI security strategy.
April 27, 2020 ‘Florentine Banker’ Group Steals Approximately £600K in Successful BEC Scam 2 min read - A threat group known as "The Florentine Banker" stole approximately £600K in a successful business email compromise (BEC) scam.
April 23, 2020 DoppelPaymer Ransomware Hits LA Suburb, Demands 100 Bitcoins as Ransom 2 min read - DoppelPaymer ransomware operators demanded 100 bitcoins as ransom from officials after allegedly attacking the city of Torrance in California's Los Angeles County.
April 21, 2020 New AgentTesla Infostealer Variant Targets Wi-Fi Credentials 2 min read - Security researchers discovered a new variant of the AgentTesla infostealer family that attempted to steal its victims' Wi-Fi credentials.
CISO April 21, 2020 Achieve Flexibility in Business Through Digital Trust and Risk Management 4 min read - Flexibility in business is a core competency. Information security can contribute to it by creating digital trust and high-performing teams who are well-trained in risk management.