How to deal with BEC attacks
Credit to Author: Oleg Sikorsky| Date: Tue, 17 Mar 2020 15:43:29 +0000
Companies worldwide regularly fall victim to business e-mail compromise attacks. We explain the danger and how to minimize it.
Read MoreRSS Reader for Computer Security Articles
Credit to Author: Oleg Sikorsky| Date: Tue, 17 Mar 2020 15:43:29 +0000
Companies worldwide regularly fall victim to business e-mail compromise attacks. We explain the danger and how to minimize it.
Read MoreCredit to Author: Alex Drozhzhin| Date: Thu, 12 Mar 2020 10:09:35 +0000
With deepfakes becoming more and more common — and more and more convincing — how can you protect your business?
Read MoreCredit to Author: William Tsing| Date: Wed, 11 Mar 2020 15:44:33 +0000
![]() | |
How do you spot the unicorn cybersecurity vendors amongst the bad apples? We show MSPs the ins and outs of vendor vetting. Categories: Tags: cybersecurity vendorsenterprisemanaged service providersMSPrisk managementSOCSOC teamsvetting cybersecurity vendorsvetting security vendors |
The post Securing the MSP: best practices for vetting cybersecurity vendors appeared first on Malwarebytes Labs.
Read MoreCredit to Author: Jeffrey Esposito| Date: Tue, 03 Mar 2020 11:09:57 +0000
At the RSA Conference 2020 in San Francisco, a panel of experts discuss the issues with securing elections.
Read MoreCredit to Author: Kaspersky Team| Date: Tue, 18 Feb 2020 18:57:04 +0000
What exactly was certified and how the certification was performed
Read MoreCredit to Author: Goutam Tripathy| Date: Thu, 13 Feb 2020 09:57:14 +0000
Quick Heal Security Labs recently came across a variant of Ryuk Ransomware which contains an additional feature of identifying and encrypting systems in a Local Area Network (LAN). This sample targets the systems which are present in sleep as well as the online state in the LAN. This sample is packed with…
Read MoreCredit to Author: Alexey Ferapontov| Date: Mon, 10 Feb 2020 20:35:09 +0000
Researchers presented a study on the reliability of modern vehicle immobilization systems at the Chaos Communication Congress.
Read MoreCredit to Author: Alex Drozhzhin| Date: Wed, 05 Feb 2020 16:50:15 +0000
Phishing and business e-mail compromise attacks rely on fake e-mails. But why is it so easy for attackers to make them so convincing?
Read More