Tag "Malware"

Back to homepage
Software

Bad security hygiene still a major risk for enterprise IT networks

Unpatched vulnerabilities, along with growing network and application complexity pose an ongoing security risk which could threaten the security of enterprise IT networks. Analyzing the biggest security findings over the

Software

What is Emotet? And how to guard against this persistent Trojan malware

The Emotet Trojan is one of the biggest malware threats in recent years. Here’s what you can do to safeguard your business.Emotet is a banking Trojan that started out stealing

Industry Insights

Security Is Key To The Success Of Industry 4.0

Manufacturing is a highly competitive industry. The continuous need to outperform competitors is to such a great degree that it is imperative for manufacturing organizations to protect their intellectual property

Artificial Intelligence

Get Ready for the First Wave of AI Malware

While viruses and malware have stubbornly stayed as a top-10 “things I lose sleep over as a CISO,” the overall threat has been steadily declining for a decade. Unfortunately, WannaCry,

Software

80 Eye-Opening Cyber Security Statistics for 2019

It’s an interesting and challenging time to be working in the cyber security industry. By and large, research indicates that cybercrime is on the rise — news headlines support these

Hardware/Network

7 Malware Families Ready to Ruin Your IoT’s Day

This latest list of Internet of Things miscreants doesn’t limit itself to botnets, like Mirai. Don’t you hate it when one loud co-worker at the office takes all the credit

Industry Insights

What Are The Biggest Cybersecurity Threats In 2019?

What are the biggest cybersecurity threats that exist right now (2019)?originally appeared on Quora: the place to gain and share knowledge, empowering people to learn from others and better understand the world.

Software

Main threat source to industrial computers? Mass-distributed malware

Malicious cyber activities on Industrial Control System (ICS) computers are considered an extremely dangerous threat as they could potentially cause material losses and production downtime in the operation of industrial

Industry Insights

Serverless, shadow APIs and Denial of Wallet attacks

In this Help Net Security podcast, Doug Dooley, Chief Operating Officer at Data Theorem, discusses serverless computing, a new area that both DevOps leaders and enterprise security leaders are having

Software

Think Inside the Box to Bridge the Cybersecurity Skills Gap

Cybercriminals are continuously evolving, scheming and ramping up attacks with complex distributed denial-of-service (DDoS) campaigns, malware scams and a plethora of techniques for sale on the dark web. In such