ICYMI: Check out the link below if you missed our latest live panel webinar "Incident Response: How to Detect & Recover Remotely".
Ready-made COVID-19 Themed Phishing Templates Copy Government Websites Worldwide (Proofpoint)
Threat actors are continuing to try and take advantage of people worldwide as the pandemic continues—and most recently their efforts have included using fake websites, associated with COVID-19 financial assistance, to steal credentials.
3 Unorthodox Ways to Further Protect your Digital Accounts from Fraud (F5 Networks)
Since we will continue to live with passwords for the foreseeable future, here are some unorthodox tips on how to further protect your digital accounts from Account Takeover fraud.
Mobile adware: the silent plague with no origin (Check Point)
Check Point’s Cyber Security Report 2020 shows that in 2019, 27% of companies suffered a cyber-attack because the security of a mobile device was breached.
Verizon's data breach report highlights how unsecured cloud storage opens door to attacks
The plague of enterprises leaving cloud storage holding private data unprotected is starting to show up in the security statistics and is one of the few attacks on the rise.
Citrix and Check Point Software Technologies Team to Deliver Next-Generation Firewall
Citrix and Check Point announced plans to enable easy deployment and management of additional next-generation firewalls within Citrix SD-WAN to provide companies with extra layers of security to protect their assets at branches and beyond.
Nvidia unleashes new generation of GPU hardware
Nvidia has announced its first new GPU architecture in three years, and it’s clearly designed to efficiently support the various computing needs of artificial intelligence and machine learning.
How to Secure Your Data Everywhere? It’s Easy With Unified Cloud Edge (McAfee)
McAfee’s Unified Cloud Edge (UCE) is a combination of endpoint DLP, web SaaS proxy and CASB, covering all the potential data leak vectors: endpoint, unsanctioned shadow IT apps, sanctioned apps (including email) and cloud to cloud transfers.
Accelerated Cloud Adoption Drives Security-as-a-Service (Cyberark)
The accelerated journey to the cloud is also driving a parallel demand for scalable “as-a-service” security solutions that can protect remote workforces from cyber attacks, secure cloud workloads and mitigate the risk of damaging data breaches.
Analyzing Dark Crystal RAT, a C# backdoor (FireEye)
Through publishing this blog post we aim to help defenders look for indicators of compromise and other telltale signs of Dark Crystal RAT, and to assist fellow malware researchers new to .NET malware, or who encounter future variants of this sample.