enterprise

MalwareBytesSecurity

Phishes, pseudophishes, and bad email

Credit to Author: William Tsing| Date: Mon, 16 Oct 2017 18:00:49 +0000

Everyone knows about phishing. But what about pseudophishing? When companies use poor design, no attribution, and broad requests for personal info, their legit emails look like a phish.

Categories:

Tags:

(Read more…)

The post Phishes, pseudophishes, and bad email appeared first on Malwarebytes Labs.

Read More
QuickHealSecurity

Malspam Campaign using CVE-2017-0199 Targets Manufacturing, Pharmaceutical, and other important Industries

Credit to Author: Quick Heal Security Labs| Date: Thu, 31 Aug 2017 08:39:49 +0000

Quick Heal Security Labs has come across various email campaigns that are actively exploiting the famous vulnerability CVE-2017-0199 in their bid to target prominent private industries in India. CVE-2017-0199 was a zero-day vulnerability reported in April 2017 by two different security firms. Almost all of the MS Office versions were…

The post Malspam Campaign using CVE-2017-0199 Targets Manufacturing, Pharmaceutical, and other important Industries appeared first on Quick Heal Technologies Security Blog | Latest computer security news, tips, and advice.

Read More
SecuritySophos

Sophos is a Visionary in the Enterprise Firewall Magic Quadrant

Credit to Author: Chris McCormack| Date: Thu, 13 Jul 2017 13:51:16 +0000

We’re excited to announce that Gartner has named Sophos a Visionary in the Enterprise Firewall Magic Quadrant for 2017<img alt=”” border=”0″ src=”https://pixel.wp.com/b.gif?host=news.sophos.com&#038;blog=834173&#038;post=40665&#038;subd=sophos&#038;ref=&#038;feed=1″ width=”1″ height=”1″ /><img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/NS-5mrNPC2o” height=”1″ width=”1″ alt=””/>

Read More
MalwareBytesSecurity

OWASP Top Ten – Boring security that pays off

Credit to Author: William Tsing| Date: Thu, 04 May 2017 16:00:28 +0000

OWASP recently published a draft list of the top 10 security vulnerabilities of 2017. While intended for developers seeking to code more secure applications, the top 10 list is based on actual survey data of threats seen in the wild and serves as a great starting point for organizations struggling with security priorities. Let’s take a look and see how long they’ve been around prior to publication.

Categories:

Tags:

(Read more…)

The post OWASP Top Ten – Boring security that pays off appeared first on Malwarebytes Labs.

Read More