July 18, 2016 Cyberattacks From Outside the Perimeter Are Costly, Ponemon Institute Finds 2 min read - A new Ponemon study found that external cyberattacks are costly, yet security professionals don't have the perimeter tools needed to prevent them.
May 5, 2016 Designer Malware Campaigns: The Rise of Couture Cybercrime? 2 min read - Cybercriminals are adding some designer touches to their malware campaigns to make them more targeted and increase the overall success rate.
April 21, 2016 Security Awareness Training: ‘Good Enough’ Won’t Keep Phish off the Hook 2 min read - A recent study indicated U.K. companies are not investing enough into security awareness training and expose themselves to phishing attacks as a result.
March 16, 2016 Fileless Malware Loaded Into Memory via PowerShell 2 min read - Malicious macros used in phishing emails can load fileless malware, which goes into a machine's program memory and can wreak havoc.
February 4, 2016 Macro Malware at Large With New Neutrino Drops 2 min read - Macro malware is making a comeback as cybercriminals take advantage of corporate employees with little security awareness.
Advanced Threats November 18, 2015 Infographic: The Top Four Cybercrime Trends Are… 2 min read - A new infographic from IBM Emergency Response Services (ERS) details four of the top trends in cybersecurity — as well as some indicators of risk.
Advanced Threats November 9, 2015 Cybercriminals Phish Their Way Into Customer Loyalty Programs 3 min read - Loyalty programs can bring big rewards to customers, but they also may make organizations more appealing to cybercriminals looking to steal data.
Identity & Access November 6, 2015 Social Engineering Attackers Deploy Fake Social Media Profiles 2 min read - Cybercriminals are using social engineering tactics on social media networks such as LinkedIn to gain access to corporate networks.
Data Protection October 9, 2015 Economic Espionage: The Myth That ‘We Have Nothing of Interest’ 3 min read - The threat of economic espionage against the enterprise is more than just a myth — it's a reality that organizations must prepare for and defend.
Malware September 3, 2015 Malicious Attachments Make a Comeback as Top Attack Vector 2 min read - Users need to be on the lookout for malicious attachments, which are growing in popularity thanks to spear phishing and social engineering.