A new study of 17 malware frameworks shows threat actors always use USB drives to sneak malware into air-gapped environments and then steal data from there.
Read moreAn Insider’s Account of Disclosing Vulnerabilities
December 3 2021Vendors drag their heels when it comes to identifying software vulnerabilities and are often loath to expedite the fixes.
Read moreTesting Faraday Cages
December 3 2021Matt Blaze tested a variety of Faraday cages for phones, both commercial and homemade.
The bottom line:
A quick and likely reliable “go/no go test” can be done with an...
Read more
Ransomware, Carding, and Initial Access Brokers: Group-IB Presents Report on Trending Crimes
December 2 2021Report explores cybercrime developments from the second half of 2020 through the first half of 2021.
Read moreDarktrace Reports 30% More Ransomware Attacks Targeting Organizations During the Holiday Period
December 2 2021Researchers also observed a 70% average increase in attempted ransomware attacks.
Read moreRemote Browser Isolation Stars in Content Protection Role
December 2 2021The entertainment industry has long had to deal with the challenge of protecting their high-value content and intellectual property. Enter remote browser isolation (RBI).
Read moreRemote Browser Isolation Stars in Content Protection Role
December 2 2021The entertainment industry has long had to deal with the challenge of protecting their high-value content and intellectual property. Enter remote browser isolation (RBI).
Read moreTop 5 Reasons to Get ‘SASE’ With Security
December 2 2021Proactively updating and integrating technology, and ensuring tight collaboration between IT and security … it's simple, right? Well, not always – especially for organizations with limited resources.
Read morePlanned Parenthood LA Breach Compromises 400,000 Patients’ Data
December 2 2021The breach, which compromised data such as insurance details and prescription information, took place between Oct. 9 and Oct. 17.
Read moreFor IT organizations, the global health crisis didn't make meeting current and future compliance obligations easier. Here are four content protection focus areas that help the enterprise maintain compliance...
Read more
Recent Comments