Many vendors at RSAC 2019 boasted of their advanced and even automated threat hunting capabilities, but it's important to understand the difference between true threat hunting and marketing jargon.
Security researchers discovered that attackers are using fake copyright infringement notifications as part of a recent Instagram hacking campaign.
The evolution of the new and difficult-to-detect category of fileless malware may soon take an insidious turn with the development of what some researchers are calling vaporworms.
Similar to the GDPR, you can approach the NIS Directive as a roadblock or a nuisance, or you can consider it an excellent opportunity to improve your security posture.
Security researchers discovered an attack campaign targeting Japanese users with a new variant of Ursnif banking malware.
Security researchers have discovered that the new SLUB backdoor is receiving attack commands from GitHub and relying on Slack for communicating with its attackers.
Deepfake videos that are indistinguishable from authentic videos are coming, and we can scarcely imagine what they'll be used for. We should start preparing for the worst.
By following the example of industry leaders with mature security analytics capabilities, less advanced organizations can improve SOC visibility and shift from reactive to proactive threat detection.
A recent phishing campaign used a fake Google reCAPTCHA as part of its efforts to target Polish bank employees with malware.
While current email security solutions can help mitigate phishing impacts, companies must recognize the role of corporate email as a social network to address the human components of this risk.