This is the fourth DeadBolt campaign this year against QNAP customers, but it differs from previous attacks in exploiting an unpatched bug instead of a known vulnerability.
Read moreThe 3 Fundamentals of Building an Effective IoMT Security Strategy
September 6 2022The high stakes and unique priorities for Internet of Medical Things devices require specialized cybersecurity strategies.
Read moreInvestor participation from prior round demonstrates confidence in the company's current and future performance.
Read moreBotnets in the Age of Remote Work
September 6 2022Here are some strategies for protecting the business against botnets poised to take advantage of remote-work vulnerabilities.
Read moreThe phishing-as-a-service offering targets accounts from tech giants, and also has connections to PyPI phishing and the Twilio supply chain attack.
Read moreRansomware in particular poses a major threat, but security vendors say there has been an increase in Linux-targeted cryptojacking, malware, and vulnerability exploits as well, and defenders need to...
Read more3 Critical Steps for Reducing Cloud Risk
September 5 2022Having a better understanding of how clouds are built, connected, and managed helps organizations mitigate risks and reduce attack surfaces.
Read moreThe US government and the Open Source Security Foundation have released guidance to shore up software supply chain security, and now it's up to developers to act.
Read moreResearchers Spot Snowballing BianLian Ransomware Gang Activity
September 2 2022The operators of the emerging cross-platform ransomware BianLian increased their command and control infrastructure this month, indicating an acceleration in their operational pace.
Read more
Recent Comments