Malware

cybersecurity SOC security operations center COVID-19

5 Ways to Keep Your Security and Operations Teams in Lockstep

Malicious activity is on the rise, especially with COVID-19 and many businesses transitioning to a remote workforce. During the first 100 Days of the pandemic, there was a 33.5 percent increase in cyberattacks. In corporate settings, human error accounts for […]

5 Ways to Keep Your Security and Operations Teams in Lockstep Read More »

COVID-19 cybercrime cyber crime malware remote

Cyber Crime Increases as Networks Grow More Vulnerable in the Wake of COVID-19

By Maribeth Anderson and Emily Selck Cyber criminals are capitalizing on the current pandemic and finding greater success in breaching an increasing number of business networks. Safeguard your network during this unprecedented time with these 7 best practices. Viruses aren’t

Cyber Crime Increases as Networks Grow More Vulnerable in the Wake of COVID-19 Read More »

zero-day vulnerabilities visibility remote work

Zero-day Vulnerabilities and the Visibility Gap Challenge During Mass Remote Work

As the world collectively deals with COVID-19, many organizations have enacted company-wide work from home policies to help slow the spread of the virus. For many organizations the sudden requirement to support home working en masse has exposed an uncomfortable

Zero-day Vulnerabilities and the Visibility Gap Challenge During Mass Remote Work Read More »

Microsoft Windows NSA CryptoAPI Crypto32.dll

Patch or Mitigate Dangerous Microsoft Windows CryptoAPI Spoofing Vulnerability ASAP

Qualys is a sponsor of TechSpective Microsoft kicked off the new decade with a bang. Last Tuesday was the first Microsoft Patch Tuesday of 2020, and one of the patches pushed out by Microsoft addresses a dangerous flaw in Crypt32.dll

Patch or Mitigate Dangerous Microsoft Windows CryptoAPI Spoofing Vulnerability ASAP Read More »

ransomware targeted attacks privilege interaction

Exposing Targeted Attacks by Observing Privilege Interactions Between Entities

In May 2019, most of Baltimore’s government computer systems were infected with a new and aggressive ransomware variant named RobbinHood. All servers, with the exception of essential services, were taken offline as a result of targeted attacks. In a ransom

Exposing Targeted Attacks by Observing Privilege Interactions Between Entities Read More »

Qualys IOC EDR Indication of Compromise

Effective Cybersecurity Requires Threat Intelligence and Comprehensive Visibility

Qualys is a sponsor of TechSpective Technology and cybersecurity are constantly changing and evolving—as are the tools, techniques and processes used by cyber attackers. Just because something may have been relatively effective once upon a time doesn’t necessarily mean it

Effective Cybersecurity Requires Threat Intelligence and Comprehensive Visibility Read More »

Scroll to Top