New McAfee report finds hackers using hidden mobile apps and unique distribution methods to target consumers. McAfee’s Mobile Threat Report 2020, found that hackers are using...
The report deconstructs the tactics, techniques and procedures (TTPs) used in the attack. SophosLabs believes the attack was the work of a nation state motivated...
Authored By Megan R. Nichols is a manufacturing and technology writer who regularly contributes to IoT Times and Manufacturing Tomorrow. She also publishes easy to...
Rise in sophisticated attacks, bot networks, attacks on critical infrastructure using evolved malware dominated the threat landscape in 2019. The Subex annual report, Threat Landscape...
About 50% of respondents have reported that they have experienced a security breach because one or more of their security products was not working as...
Beware: Attackers are finding new ways to avoid detection when they compromise email accounts. Researchers from Barracuda and UC Berkeley, conducting a large-scale analysis of...
According to the report, 60% of initial entries into victims’ networks that were observed leveraged either previously stolen credentials or known software vulnerabilities, allowing attackers...
Check Point’s researchers highlight Yahoo! as most imitated brand for email-based phishing, and Spotify as the most imitated for web-based phishing attempts. Check Point Research’s...
IBM Security and McAfee, in association with OASIS, are leading an industry initiative to bring interoperability and data sharing across cybersecurity products. The OASIS international...