Baltimore encrypted
Credit to Author: Leonid Grustniy| Date: Thu, 30 May 2019 16:42:19 +0000
For three weeks, Baltimore’s administration has been struggling with the aftermath of a ransomware attack.
Read MoreRSS Reader for Computer Security Articles
Credit to Author: Leonid Grustniy| Date: Thu, 30 May 2019 16:42:19 +0000
For three weeks, Baltimore’s administration has been struggling with the aftermath of a ransomware attack.
Read MoreCredit to Author: Marina Mash| Date: Wed, 29 May 2019 22:09:03 +0000
How to steal a million (OK, half a million), or what happened to the Boca Juniors
Read MoreCredit to Author: Pieter Arntz| Date: Tue, 07 May 2019 15:00:00 +0000
![]() | |
| You’ve discovered that your organization has been breached. Now what? Learn which steps to take in the immediate aftermath to limit the damage and preserve your company’s reputation. Categories: Tags: breachbusinessdata breachdata breachesinformationlearnobligationspreparations |
The post What to do when you discover a data breach appeared first on Malwarebytes Labs.
Read MoreCredit to Author: Artem Karasev| Date: Fri, 17 May 2019 13:46:08 +0000
To protect themselves, businesses need to take a proactive approach, constantly adapting their security controls to the ever-changing threat environment.
Read MoreCredit to Author: Joyce Huang| Date: Thu, 16 May 2019 14:30:38 +0000

Email is a mature technology, but threats targeting email are evolving and getting more sophisticated. 97%1 of ransomware attacks come from email. That’s why there are so many email security vendors and solutions in the market offering different types of technologies and coverages. Picking the best email security solution for an organization can be overwhelming….
The post Why You Should Pick a Leader for Your Enterprise Email Security appeared first on .
Read MoreCredit to Author: Pieter Arntz| Date: Fri, 10 May 2019 15:00:00 +0000
![]() | |
| Losing trust in financial institutions can have a disrupting effect on society. And malware authors love to target these direct sources of money. How can we protect them? Categories: Tags: APTsbanking appsbanking Trojansbanksbitcoincryptocurrenciescryptocurrencycryptowalletsemotetexploit kitsfinancial institutionsfinancialsfintechinformation stealersinfrastructuremalwarevital |
The post Vital infrastructure: Threats target financial institutions, fintech, and cryptocurrencies appeared first on Malwarebytes Labs.
Read MoreCredit to Author: Marvin the Robot| Date: Wed, 08 May 2019 16:18:47 +0000
Although the suspected leader of the FIN7 cybergang was arrested, malicious activity somehow persists.
Read MoreCredit to Author: Pieter Arntz| Date: Tue, 07 May 2019 15:00:00 +0000
![]() | |
| You’ve discovered that your organization has been breached. Now what? Learn which steps to take in the immediate aftermath to limit the damage and preserve your company’s reputation. Categories: Tags: breachbusinessdata breachdata breachesinformationlearnobligationspreparations |
The post What to do when you discover a data breach? appeared first on Malwarebytes Labs.
Read More