Three Phases of a Ransomware Attack
When you’re looking for a way to defend your company against a threat, it helps to break the threat down into smaller parts. Where does it come from and how do we stop it? How does it spread and how …
When you’re looking for a way to defend your company against a threat, it helps to break the threat down into smaller parts. Where does it come from and how do we stop it? How does it spread and how …
If your organization uses Office 365, Barracuda has a new tool you need to check out. Barracuda Email Threat Scan for Office 365 performs a non-intrusive scan of inboxes, sent mail, junk mail and deleted folders to identify any hidden …
Find Out What Threats Are Lurking in Your Office 365 Email Read More »
Today, some of the most advanced malware is used only a few times for very targeted attacks rather than the mass attacks of the past. In the past, the idea was to flood the networks with enough infected files that …
How to Detect and Defend Against Advanced Malware Read More »
You don’t have to know how to rebuild an engine even how to change your own oil to drive a car. You don’t have to understand how Intel fits billions of transistors on a processor the size of a postage …
Sophos finds many ‘advanced’ malware attackers lack coding skills Read More »
Dune is my favorite book of all time. I have read the original Dune trilogy more than once, and I have read many of the subsequent and peripheral titles related to the epic Dune saga. I used to own and …
A closer look at the Sandworm cyber espionage threat Read More »
A new cyber espionage threat dubbed “Sandworm” was revealed today. It exploits a zero day flaw that exists in all supported versions of the Windows operating system, and has apparently been active since 2009. That was FIVE years ago. That’s …
You still need to start with the security best practices Read More »
The evolution of malware and exploits is a myth. At face value, it seems like there was a logical progression from script kiddies pushing the envelope just for the sake of pushing the envelope, to malware for malicious intent, to …