Please turn on your JavaScript for this page to function normally.
Office 365
Flaw in Office 365 with Azure AD Connect could result in domain compromise

The Preempt research team has uncovered a vulnerability with Microsoft Office 365 when integrated with an on-premises Active Directory Domain Services (AD DS) using Azure AD …

watch
Emerging trends companies should prepare for in 2018

Today’s organizations face a cyber security landscape that is more difficult to navigate than ever before. To shed light on what lies ahead and help businesses better …

industry
Whitepaper: Top 20 cyber attacks on ICS

This whitepaper is no longer available. The technique for evaluating the risk of cyber-sabotage of industrial processes are well understood by those skilled in the art. …

Defending against crypto ransomware
eBook: Defending against crypto-ransomware

This promotion has ended. According to the Symantec 2017 Internet Security Threat Report, the average ransom demand has reached over $1000 in the last year. Therefore, it is …

USB
Enterprise USB security is outdated and inadequate

While USB drives are ubiquitous for employees across all industries, security policies for these devices are often severely outdated or grossly inadequate for protecting …

mobile code
An analysis of 120 mobile app stores uncovers plethora of malicious apps

RiskIQ analyzed 120 mobile app stores and more than 2 billion daily scanned resources. In listing and analyzing the app stores hosting the most malicious mobile apps and the …

biohazard
Return of Necurs botnet brings new ransomware threat

The Necurs botnet has returned to the top ten most prevalent malware during November 2017, as cybercriminals used it to distribute a new form of ransomware, according to Check …

servers
Worldwide server revenue grew 16% in Q3 2017

In the third quarter of 2017, worldwide server revenue increased 16 percent year over year, while shipments grew 5.1 percent from the second quarter of 2016, according to …

bot
Will IoT botnets catapult the industry toward security regulation in 2018?

Attackers demonstrated the power of an IoT-fueled botnet in 2016 when the Mirai botnet took down major websites like Reddit, Twitter and GitHub. Despite the damages, no …

face
A layered approach to modern identity

The way we work is evolving. Traditional desktop computers and laptops are slowly giving way to the mobile device. From smartphones to tablets, a growing number of employees …

abstract, generic
Week in review: Ransomware’s next stop, NiceHash hack, and why phishers love HTTPS

Here’s an overview of some of last week’s most interesting news and articles: Bitcoin traders beware: Fake trading bot offer delivers RAT The malicious offer comes …

hand
Keep unexpected holiday security surprises to a minimum

The chilly weather is setting in here in the northern hemisphere, and as we get ready for the holidays many of us are gathering round a cheery fire. But not everyone is …

Don't miss

Cybersecurity news