This Week in Security News: Cloud Risks and Container Vulnerability

Credit to Author: Jon Clay (Global Threat Communications)| Date: Fri, 15 Feb 2019 15:00:02 +0000

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, learn about this year’s current uses and emerging risks of the cloud. Also, find out what new vulnerability was found in containers. Read on:  Attacking Containers and…

The post This Week in Security News: Cloud Risks and Container Vulnerability appeared first on .

Read more

The Cloud in 2019: Current Uses and Emerging Risks

Credit to Author: Trend Micro| Date: Wed, 13 Feb 2019 15:48:32 +0000

In the current tech landscape, one would be hard-pressed to find an organization that operates without the help of cloud environments and capabilities. From data storage and document sharing to enabling remote access and communication, the cloud represents the most critical linchpin of today’s IT-focused business processes. What’s more, the power of the cloud is…

The post The Cloud in 2019: Current Uses and Emerging Risks appeared first on .

Read more

This Week in Security News: Consumer Data and Malware

Credit to Author: Jon Clay (Global Threat Communications)| Date: Fri, 08 Feb 2019 15:00:14 +0000

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, learn what security issues and critical threats will impact consumer data this year. Also, learn about a malicious Adobe app targeting macOS systems. Read on:  Keys to…

The post This Week in Security News: Consumer Data and Malware appeared first on .

Read more

Keys to Safeguarding Consumer Data in 2019

Credit to Author: Trend Micro| Date: Mon, 04 Feb 2019 15:00:08 +0000

Businesses and providers typically collect certain details from their customers in order to support service delivery. This information has always been a top target for hackers, but given the high level and rising sophistication of threats, it’s more imperative than ever to ensure it’s protected. After all, a breach of this information doesn’t just impact the…

The post Keys to Safeguarding Consumer Data in 2019 appeared first on .

Read more

This Week in Security News: Hacker Strategies and Spyware Attacks

Credit to Author: Jon Clay (Global Threat Communications)| Date: Fri, 01 Feb 2019 14:00:13 +0000

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, learn about how hackers are improving their breach strategies. Also, learn about new spyware attacks via URLs, websites, and mobile apps. Read on:  Informing Your Security Posture:…

The post This Week in Security News: Hacker Strategies and Spyware Attacks appeared first on .

Read more

What Enterprise Leaders Should know about Persistent Threats in 2019

Credit to Author: Trend Micro| Date: Thu, 31 Jan 2019 15:00:29 +0000

Staving off critical threats in the current cybersecurity landscape is a tall order for any size organization. As hackers continually shift and improve upon their attack and breach strategies, IT and security stakeholders must do their best to keep up and remain informed of these trends. This is one of the best and most successful…

The post What Enterprise Leaders Should know about Persistent Threats in 2019 appeared first on .

Read more

Informing Your Security Posture: How Cybercriminals Blend into the Background

Credit to Author: Trend Micro| Date: Tue, 29 Jan 2019 14:00:23 +0000

Maintaining protection over an enterprise’s critical data, systems and assets is a continual uphill battle. Not only are chances good that the business’s digital footprint is growing through new applications, but hackers are also constantly bolstering their capabilities to silently breach platforms and maintain a presence under the radar of the IT team. In the…

The post Informing Your Security Posture: How Cybercriminals Blend into the Background appeared first on .

Read more

This Week in Security News: Ransomware and Cyber Threats

Credit to Author: Jon Clay (Global Threat Communications)| Date: Fri, 25 Jan 2019 14:00:09 +0000

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, learn about new routines for encryption of JobCrypter ransomware. Also, understand how Emotet has managed to evolve into one of the most notorious cyber threats in existence….

The post This Week in Security News: Ransomware and Cyber Threats appeared first on .

Read more

This Week in Security News: Risky Radio Remotes and Cybercrime

Credit to Author: Jon Clay (Global Threat Communications)| Date: Fri, 18 Jan 2019 15:18:00 +0000

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, learn about Trend Micro’s new research on radio frequency technology and the risks of radio remote controllers. Also, understand why there is a rise in physical crime…

The post This Week in Security News: Risky Radio Remotes and Cybercrime appeared first on .

Read more

This Week in Security News: Adware and Ransomware

Credit to Author: Jon Clay (Global Threat Communications)| Date: Fri, 11 Jan 2019 15:23:08 +0000

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, learn about an adware that disguised itself as different apps and monitors mobile devices. Also, learn more about the different ransomware attacks Trend Micro has been tracking….

The post This Week in Security News: Adware and Ransomware appeared first on .

Read more

This Week in Security News: Spyware and Data Breaches

Credit to Author: Jon Clay (Global Threat Communications)| Date: Fri, 04 Jan 2019 15:13:45 +0000

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, learn about a spyware that disguised itself as an Android application to gather information from users. Also, find out the biggest global data breaches of 2018 and…

The post This Week in Security News: Spyware and Data Breaches appeared first on .

Read more