Macro Intruders: Sneaking Past Office Defenses
By Talos Group Macros have been used since the mid 1990s to spread malware and infect systems. Increased user awareness of the need to disable the macro function within Microsoft Word during the late 90s and early 2000s sent these malware into decline. However, a change in Microsoft (MS) Office file formats dating from 2007 […]
Fortinet FortiGuard Labs Cites Increased Cyber Threat Activity in Brazil Deserving Special Attention in Coming Weeks
Fortinet FortiGuard Labs Cites Increased Cyber Threat Activity in Brazil Deserving Special Attention in Coming Weeks Source:: Fortinet
Fortinet FortiGuard Labs Cites Increased Cyber Threat Activity in Brazil Deserving Special Attention in Coming Weeks
Fortinet FortiGuard Labs Cites Increased Cyber Threat Activity in Brazil Deserving Special Attention in Coming Weeks Source:: Fortinet
Brandaktuell – Cisco Midyear Security-Report 2016
Jetzt druckfrisch verfügbar (in englischer Fassung): Der Cisco Midyear Security-Report 2016 kann hier geladen werden. Die größte Herausforderung bleibt die Zeit, in der erfolgreiche Angreifer ihr Unwesen im Kundennetzwerk treiben können. Sei es zum Bau eines virtuellen Brückenkopfes, um die Präsenz im fremden LAN zu festigen, oder einfach die größere Zeitspanne, um wichtige Daten aus dem […]
Cisco Completes Acquisition of CloudLock
By David Ulevitch I’m excited to announce today that Cisco has completed the acquisition of CloudLock. CloudLock’s unique approach to security enables customers to manage and secure their transition to the cloud by providing powerful security insights and controls that are easy to deploy and simple to manage. In a new IT landscape marked by […]
Cisco Completes Acquisition of CloudLock
By David Ulevitch I’m excited to announce today that Cisco has completed the acquisition of CloudLock. CloudLock’s unique approach to security enables customers to manage and secure their transition to the cloud by providing powerful security insights and controls that are easy to deploy and simple to manage. In a new IT landscape marked by […]
Attackers Evolve Tactics to Infiltrate Your Network via Email
By Scott Bower Email continues to be the number one business communication method and is still the number one threat vector. This ubiquitous communication technology also provides an effective path for criminal actors. Today, customers are more concerned about targeted and other advanced attacks rather than spam capture rates. Well-funded, educated criminals employ a wide […]