Combatting BEC and EAC: How Security Awareness Can Help You Tackle Business Email Compromise (Proofpoint)
86% of organizations reported experiencing business email compromise, with most organizations reporting multiple attacks. These attacks are getting more sophisticated each year—so how can you prepare your users for the potential attack that slips by perimeter defenses?
2020 – A Paradigm Shift for VDI and the Edge (IGEL)
WFH dominated the end user computing space in 2020 and created a tactical increase of VDI/DaaS use. But now organizations are looking to the future and developing strategies which will also enable a ‘work from anywhere’ approach – one that supports a return to the workplace at some point yet simultaneously provides a longer term WFH strategy.
Emotet Campaign Restarts After Seven-Week Hiatus
Seven weeks after the last major Emotet campaign, the cybercriminals behind the downloader have started up their attempts to compromise more systems, according to multiple cybersecurity organizations.
Golden SAML Revisited: The Solorigate Connection (CyberArk)
Golden SAML is an attack vector that can serve sophisticated attackers in their post-exploitation stages allowing them to maintain persistency and gain access to different services in a convenient and stealthy manner.
Innovation Done Right: Proactive Storage Management (Pure Storage)
Pure1 offers industry-first and industry-leading proactive support, including continuous monitoring of infrastructure, service level agreements (SLAs), and subscriptions, plus proactive issue resolution.
Naval Information Warfare Systems Command (NAVWAR) Awards FireEye First Place in Network Threat Detection Challenge
The challenge found FireEye Network Security to deliver the best performance, based on the criteria and cost-benefit framework. The malware collection used also spanned categories likely to be seen in the real-world to produce the most effective evaluation.
4 Ways to Help Your Family Combat Cyber Threats in the New Year (McAfee)
The best defense against online threats is a good offense, which is the digital space means staying informed. The more you know about how hackers exploit consumers, the more you can dodge shady phishing scams such as emails trying to sell you the COVID-19 vaccine online.
AI at Your Fingertips: NVIDIA Launches Storefront in AWS Marketplace
To help data scientists and developers build and deploy AI-powered solutions, the NGC catalog offers hundreds of NVIDIA GPU-accelerated machine learning frameworks and industry-specific software development kits.
This new phishing attack uses an odd lure to deliver Windows trojan malware
The malware uses several layers of obfuscation in order to avoid being detected as malicious activity – and it has also added new techniques in order to provide additional means of avoiding detection.
Our New Year’s Resolution for You: Protect Your IoT Networks and Devices! (Check Point)
We are in the business of security and we know that as the world gets smarter, the risks get higher as well – for the simple reason that as IoT devices connect to a given network it broadens the attack surface.
Reflecting on the most popular HDX innovations of the past two years (Citrix)
With every Citrix Virtual App and Desktop release, our HDX team releases a bundle of features designed to optimize the experience of virtual sessions, whether they’re minor end-user enhancements or something more significant.