Like most such mobile malware, the new one doesn't encrypt data but attempts to make an infected system impossible to use, Microsoft says.
Read moreApple Pays Bug Bounty to Enterprise Network Researchers
October 9 2020So far, the company has doled out $288,000 to five researchers who, in three months, found 55 vulnerabilities in its corporate infrastructure.
Read moreCritical Zerologon Flaw Exploited in TA505 Attacks
October 9 2020Microsoft reports a new campaign leveraging the critical Zerologon vulnerability just days after nation-state group Mercury was seen using the flaw.
Read moreCISOs Planning on Bigger Budgets: Report
October 9 2020Budgets are on the rise, even in a time of revenue worries across the industry.
Read moreOur podcast is back for Series 3 - here's Episode 1!
Read moreWhy MSPs Are Hacker Targets, and What To Do About It
October 9 2020Managed service providers are increasingly becoming the launching pad of choice for ransomware and other online malfeasance.
Read moreIn recent weeks, Emotet has emerged as the most common form of ransomware. Managing the risk involves starts with understanding the way it works.
Read moreDespite fears that the burgeoning population of remote workers would lead to breaches, companies have held their own, a survey of threat analysts finds.
Read moreThere's an old adage in information security: "Every company gets penetration tested, whether or not they pay someone for the pleasure." Many organizations that do hire professionals to test...
Read moreScale Up Threat Hunting to Skill Up Analysts
October 8 2020Security operation centers need to move beyond the simplicity of good and bad software to having levels of "badness," as well as better defining what is good. Here's why....
Read more
Recent Comments