Listen to PhishMe Threat Intelligence Expert, Brendan Griffin, to learn about the widespread implementation of anti-analysis methods, a notable evolution in techniques and tools to deliver malware, and the growing threat of encryption
Some companies have multiple applications in different public clouds. There is a possibility that some public cloud applications need to access another public cloud's application data. Should this architecture be allowed?
An at-a-glance 2016 Year in Review Malware Infographic, with a close look at the fastest-growing attack vector of the past year: Ransomware. PhishMe's research team found that the explosive growth of ransomware was the most
It is easy to blame users for causing ransomware infections of their own systems. However, the reality is that for the user to infect their system, there are many technical failures, which are due to the IT staff’s actions or lack...
Over the weekend, Chris Byrne, an information security consultant and instructor for Cloud Harmonics, published a post to Facebook outlining a serious problem with the processes and third-party API used to deliver and manage Symantec...
Discover the key facets of high-fidelity security - the ability for organizations to collect comprehensive and timely data and gain context for fast and prioritized threat detection and response. Learn about the benefits of combining
The FBI director James Comey is suggesting an international approach to solving the encryption debate. He proposes that the U.S. might work with other countries on a “framework” for creating legal access to encrypted tech devices.
The price of a single Bitcoin passed that of an ounce of gold for the first time this month, and scammers were quick to get in on the action with Ponzi schemes and phishing sites spread via social media.
The U.S. CIA has had tools to infect Apple Mac computers by connecting malicious Thunderbolt Ethernet adapters to them since 2012, according to new documents purported to be from the agency and published by WikiLeaks.
The security industry finds itself at the point when traditional solutions do not cover some new threats and businesses are still uncertain about 'beyond-prevention' methods like staff training, security audits and consulting. These
Steven Bay, a former defense contractor, knows a thing or two about insider threats. For a brief period, he was the boss of Edward Snowden, the famous leaker who stole sensitive files from the National Security Agency.
Cisco security research breaks down the anatomy of a cyberattack throughout the exploit kit infection chain, all the way to ransomware attacks and investigation into such breaches, at SecureWorld Boston event
Anti-fraud measures by the Internal Revenue Service (IRS) and state agencies over the past two years have made tax refund scams harder for cyber criminals to pull off even as attacks targeting taxpayer information continue unabated.
Developers of the popular LastPass password manager rushed to push out a fix to solve a serious vulnerability that could have allowed attackers to steal users' passwords or execute malicious code on their computers.