Sophos Identifies Potential Tag-Team Ransomware Activity
August 22 2022Company research indicates ransomware gangs may be working in concert to orchestrate multiple attacks, explains Sophos’ John Shier.
Read moreCompany research indicates ransomware gangs may be working in concert to orchestrate multiple attacks, explains Sophos’ John Shier.
Read moreJust as cyber criminals change tactics and strategy for more effectiveness, so must infosec pros and their organizations, according to Martin Roesch of Netography.
Read moreInQuest’s Pedram Amini takes a deep dive into file detection and response as a way to prevent file-borne attacks.
Read moreSecureworks’ Nash Borges describes how his team has applied AI and ML to threat detection.
Read moreNovel ransomware was created with the Go open source programming language, demonstrating how malware authors increasingly are opting to employ the flexible coding language.
Read moreTanium’s Chris Hollenbeck explains how converged endpoint management helps overcome obstacles to endpoint visibility.
Read moreWe haven't validated this vuln ourselves... but the source of the story is impeccable. (Impeccably dressed, at least.)
Read morePentera’s Omer Zucker outlines exposure management’s biggest challenges in closing security gaps.
Read moreThreat intel has changed over the years and that’s changed how customers use it, says Matt Olney, director of Talos threat intelligence and interdiction at Cisco.
Read moreReplacing passwords is not as easy as people think, but there is hope.
Read more
Recent Comments