FBI: Businesses lost $3.1 billion in email ‘impersonation’ scams

Total losses caused by Business Email Compromise (BEC), a sophisticated scam targeting ...

Hypervisor Introspection: Fighting APTs in Business Environment – Part 2

Since nothing that’s being executed in raw memory is encrypted – just scrambled – APTs that ...

Companies Urged to Adopt Newest Technologies to Fight Advanced Threats, Gartner Says

As the threat landscape evolves, security vendors try to launch breakthrough technologies to ...

Jun 13, 2016

IoT Impact and Evolution in the Next Decade

Some of the most beneficial IoT implementations on the market relate to sensors and smart ...

Companies Piling up Bitcoins for Cyber-extortionists - Is this Defeat?

It seems UK businesses are raising a white flag to online extortionists. One in three medium ...

‘Is this data mine?’ How to answer this honest question in data breach verification

Established companies like LinkedIn, Tumblr and MySpace are being run through the mill ...

Hypervisor Introspection Redefines Security for Virtualized Environments

From 1960s mainframes to today’s cloud-centric evolution, data centers have undergone ...

Cyber insurance market remains fluid

We’ve been writing a lot about cybersecurity insurance - most recently in Cybersecurity ...

The essential value of good threat intelligence

In reaction to the rising complexity and increased damage of certain cyber-attacks, more ...

How to detect targeted attacks by using memory introspection

Cybercriminals can spend months inside organizations, storing away information for a future ...

Subscribe to Blog Updates

On-demand Webinar

2023 MITRE Engenuity ATT&CK® Evaluations: Enterprise -Deciphering the Results

WATCH NOW