A single breach is all it takes to wreak havoc on a health care organization that relies solely on perimeter controls for critical data protection.
A recent phishing campaign targeted GitHub developers with Dimnie malware, which enables fraudsters to alter open source code packages.
Floki Bot is more versatile than most banking Trojans because it uses spear phishing methods and the RIG exploit kit to steal credit card track data.
IBM observed a spike in malware activity that uses Visual Basic for Applications (VBA) macros to deliver malicious attachments.
Security teams can use a feedback loop to measure end user security, educate users, illustrate consequences and measure end user behavior.
A new Ponemon study found that external cyberattacks are costly, yet security professionals don't have the perimeter tools needed to prevent them.
Cybercriminals are adding some designer touches to their malware campaigns to make them more targeted and increase the overall success rate.
A recent study indicated U.K. companies are not investing enough into security awareness training and expose themselves to phishing attacks as a result.
Malicious macros used in phishing emails can load fileless malware, which goes into a machine's program memory and can wreak havoc.
Macro malware is making a comeback as cybercriminals take advantage of corporate employees with little security awareness.