February 26, 2020 Cloud Snooper Attack Uses Innocent-Looking Requests to Bypass Firewall Rules 2 min read - Security researchers discovered a new attack they're calling "Cloud Snooper" that uses innocent-looking requests to bypass the rules of many, if not most, firewalls.
Cloud Security December 23, 2019 Slowing Data Security Tool Sprawl in a Hybrid Multicloud World 3 min read - Having centralized visibility and control over the organization's data security and compliance posture helps security teams take a comprehensive approach to hybrid multicloud data protection.
December 16, 2019 BuleHero Botnet Uses Multiple Lateral Movement Modules to Drop XMRig Miner, Gh0st RAT 2 min read - The BuleHero botnet was seen using multiple modules to move laterally on a network and increase the spread of its two payloads, the XMRig miner and the Gh0st remote-access Trojan (RAT).
November 11, 2019 Platinum Group Using New Titanium Backdoor to Target APAC Region 2 min read - Researchers have spotted the Platinum group targeting organizations in the APAC region with a new Titanium backdoor.
Data Protection November 8, 2019 10 Myths and Misconceptions About Industrial Espionage 4 min read - Industrial espionage is real, it's common, and it can be very costly for your organization. Don't fall for the myths around this serious issue. Start preparing for the threat today.
Application Security July 23, 2019 Enhance Customer Data Privacy and Digital Trust by Avoiding Dark Patterns 4 min read - Some apps and sites are finding ways to subvert their user interfaces in ways that intentionally manipulate users. These methods are collectively known as dark patterns.
Intelligence & Analytics July 11, 2019 Take a Proactive Approach to the Darknet Threat 4 min read - A proactive approach to security and intelligence gathering is the best way to stem the tide of threats and lucrative trading of business-critical data on the darknet.
July 10, 2019 Astaroth Attack Infects Windows Machines Via Living-Off-the-Land Techniques 2 min read - An Astaroth attack leveraged only living-off-the-land techniques to run the backdoor directly in memory on Windows machines.
Identity & Access December 7, 2018 Protect the Keys to Your Kingdom With Privileged Access Management 3 min read - The importance of implementing privileged access management (PAM) is undeniable. But how are organizations doing with actually implementing PAM solutions?
Data Protection December 4, 2018 A New Privacy Frontier: Protect Your Organization’s Gold With These 5 Data Risk Management Tips 5 min read - The enactment of recent privacy mandates is just the start. A comprehensive data risk management program established before more regulations go into effect is well worth its weight in gold.