Threats

Deep Instinct Warns of (Even More) Massive Ransomware Problems

This week I met with Deep Instinct, one of the most advanced deep learning security firms out of Israel.  As you’d expect, ever since...

USAID Email Phishing Campaign Shows Supply Chain Threats Continue

A Russian-based group’s cyberattack in late May on a range governmental agencies, think thanks, non-governmental agencies (NGOs) and the like around the world highlight...

PowerShell Is Source of More Than a Third of Critical Security Threats

PowerShell was the source of more than a third of critical threats detected on endpoints in the second half of 2020, according to a...

The Microsoft Exchange Attack Saga Continues

With companies and organizations under siege on so many fronts over the past year, the last thing internal IT departments needed was another daunting...

Google Chrome’s Latest Zero-Day Bug: What You Need to Know

Google Chrome is the most widely used web browser on the market by a landslide, so bugs and other vulnerabilities can spell disaster if...

How to Prevent SQL Injection Attacks

First discovered in 1998, SQL injections (SQLi) are still a devastatingly effective attack technique and remain a top database security priority. SQL, or Structured Query...

Ransomware Protection in 2021

The internet is fraught with peril these days, but nothing strikes more fear into users and IT security pros than the threat of ransomware. A...

How to Prevent Different Types of Malware

Malware, short for "malicious software," is any unwanted software on your computer that, more often than not, is designed to inflict damage. Since the...

Protecting Against Solorigate TTPs: SolarWinds Hack Defenses

A March 2020 software update of the SolarWinds Orion management platform gave malicious actors unhindered access to key government and enterprise networks. Microsoft has...

Automating Security Risk Assessments for Better Protection

Protecting your organization from IT security risks is an ongoing, fluid task. Proactively identifying, mitigating and remediating security threats is one of the biggest...

Latest articles