Threats

LinkedIn Hack is Scraped Data, Company Claims

A hacker who recently offered 700 million LinkedIn records for sale alarmed LinkedIn users and security specialists, but the company insists the data is...

Ransomware Groups are Targeting VMs

Virtual machines are becoming an increasingly popular avenue cybercriminals are taking to distribute their ransomware payloads onto compromised corporate networks. Bad actors have been exploiting...

Ransomware Evolves as Groups Embrace as-a-Service Models

At first glance, the report this week from cybersecurity software vendor McAfee showing that the incidence of ransomware dropped by half in the first...

Deep Instinct Warns of (Even More) Massive Ransomware Problems

This week I met with Deep Instinct, one of the most advanced deep learning security firms out of Israel.  As you’d expect, ever since...

USAID Email Phishing Campaign Shows Supply Chain Threats Continue

A Russian-based group’s cyberattack in late May on a range governmental agencies, think thanks, non-governmental agencies (NGOs) and the like around the world highlight...

PowerShell Is Source of More Than a Third of Critical Security Threats

PowerShell was the source of more than a third of critical threats detected on endpoints in the second half of 2020, according to a...

The Microsoft Exchange Attack Saga Continues

With companies and organizations under siege on so many fronts over the past year, the last thing internal IT departments needed was another daunting...

Google Chrome’s Latest Zero-Day Bug: What You Need to Know

Google Chrome is the most widely used web browser on the market by a landslide, so bugs and other vulnerabilities can spell disaster if...

How to Prevent SQL Injection Attacks

First discovered in 1998, SQL injections (SQLi) are still a devastatingly effective attack technique and remain a top database security priority. SQL, or Structured Query...

How to Prevent Different Types of Malware

Malware, short for "malicious software," is any unwanted software on your computer that, more often than not, is designed to inflict damage. Since the...

Latest articles