How Cyber Attacks Changed During the Pandemic
The F5 Security Incident Response Team (F5 SIRT) helps customers tackle security incidents in real time. #F5 reviewed all the reported incidents from January through August 2020 to see how the pandemic changed the cyberthreat landscape.
Pursue your unique cloud strategy with Citrix
Citrix solutions are designed to reduce the complexity of your cloud migration, whether it’s part of a planned transition or an acceleration of your strategy to enable business continuity, remote work, or increased agility.
Ransomware: How to Avoid the Dangerous Wave of Attacks (Check Point)
The multi-year costs of protecting an organization from ransomware are less than the cost of recovering from a single ransomware attack.
McAfee Releases SaaS-Based Suites That Deliver Comprehensive and Unified Cybersecurity Across Endpoints, Web and Cloud
Available today, all three suites include McAfee MVISION Insights, the industry’s first proactive and actionable threat posture capability that prioritizes risk, predicts the success of countermeasures and prescribes remedial actions.
What is phishing? Everything you need to know to protect yourself from scam emails and more
Many phishing scams come with tell-tale signs that they aren't legitimate - including strange spelling, weird formatting, low-res images and messages that often don't make complete sense. But some could fool even the most seasoned internet user.
The Zero-Trust Mandate: Never Trust, Continually Verify (Proofpoint)
The best way to address the systemic flaws in the traditional network security model is to replace that site-centric approach with an identity-based approach that includes both dynamic, per-user network segmentation and continuous authentication.
National Cybersecurity Awareness Month – Key Takeaways (Pure Storage)
October is here, but Halloween isn’t the only spooky thing to think about this month. It’s also National Cybersecurity Awareness Month – a time for businesses of all sizes to turn their attention to digital diligence and combating cyber threats.
FIN11: Widespread Email Campaigns as Precursor for Ransomware and Data Theft (FireEye)
In some ways, FIN11 is reminiscent of APT1; they are notable not for their sophistication, but for their sheer volume of activity. There are significant gaps in FIN11’s phishing operations, but when active, the group conducts up to five high-volume campaigns a week.
Don’t Stop Risk Distancing. Remote Work Is Here to Stay (CyberArk)
Opportunistic attackers massively scaled their attacks but continued using tried-and-true methods like phishing, social engineering and brute force to steal credentials and use them to gain illegitimate privileged access to sensitive assets.