The Active Adversary Playbook 2022

Credit to Author: Tilly Travers| Date: Tue, 07 Jun 2022 11:02:43 +0000

Cyberattacker behaviors, tactics and tools seen on the frontline of incident response during 2021

Read more

Trojans, ransomware dominate 2018–2019 education threat landscape

Credit to Author: Wendy Zamora| Date: Wed, 14 Aug 2019 13:00:00 +0000

Trojans such as Emotet and TrickBot were the top threat for the education sector in the 2018–2019 school year. What threats will the new school year bring?

Categories:

Tags:

(Read more…)

The post Trojans, ransomware dominate 2018–2019 education threat landscape appeared first on Malwarebytes Labs.

Read more

Protecting Critical Infrastructure and Roadways: How Smart Cities Create New Risks

Credit to Author: Trend Micro| Date: Wed, 23 Jan 2019 14:14:39 +0000

Advanced technology has changed countless facets of everyday life, from internal enterprise processes to consumer pursuits and beyond. Even the design, management and support for large and small cities has shifted thanks to innovative smart city systems. While advanced components to support utilities, critical infrastructure, traffic and more can bring numerous benefits, these solutions also open…

The post Protecting Critical Infrastructure and Roadways: How Smart Cities Create New Risks appeared first on .

Read more

This Week in Security News: Facebook and Feds

Credit to Author: Trend Micro| Date: Fri, 03 Aug 2018 13:38:41 +0000

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, Facebook’s chief security officer resigned as Facebook steps up its cybersecurity efforts. Also, Feds indicted three Ukrainians charged with stealing data on 15 million payment cards from…

The post This Week in Security News: Facebook and Feds appeared first on .

Read more