Three Phases of a Ransomware Attack
When you’re looking for a way to defend your company against a threat, it helps to break the threat down into smaller parts. Where does it come from and how do we stop it? How does it spread and how […]
When you’re looking for a way to defend your company against a threat, it helps to break the threat down into smaller parts. Where does it come from and how do we stop it? How does it spread and how […]
If your organization uses Office 365, Barracuda has a new tool you need to check out. Barracuda Email Threat Scan for Office 365 performs a non-intrusive scan of inboxes, sent mail, junk mail and deleted folders to identify any hidden
Find Out What Threats Are Lurking in Your Office 365 Email Read More »
Today, some of the most advanced malware is used only a few times for very targeted attacks rather than the mass attacks of the past. In the past, the idea was to flood the networks with enough infected files that
How to Detect and Defend Against Advanced Malware Read More »
You don’t have to know how to rebuild an engine even how to change your own oil to drive a car. You don’t have to understand how Intel fits billions of transistors on a processor the size of a postage
Sophos finds many ‘advanced’ malware attackers lack coding skills Read More »
Dune is my favorite book of all time. I have read the original Dune trilogy more than once, and I have read many of the subsequent and peripheral titles related to the epic Dune saga. I used to own and
A closer look at the Sandworm cyber espionage threat Read More »
A new cyber espionage threat dubbed “Sandworm” was revealed today. It exploits a zero day flaw that exists in all supported versions of the Windows operating system, and has apparently been active since 2009. That was FIVE years ago. That’s
You still need to start with the security best practices Read More »
The evolution of malware and exploits is a myth. At face value, it seems like there was a logical progression from script kiddies pushing the envelope just for the sake of pushing the envelope, to malware for malicious intent, to