We recently encountered a cryptocurrency-mining malware affecting Linux systems. It is notable for being bundled with a rootkit component that hides the malicious process’ presence from monitoring tools.
An event like the World Cup raises security issues, and it's not just about the need to physically secure everything from the venues and the audience to the players and delegates -- digital security is just as important.
Users of Apache Struts are encouraged to make a necessary update to prevent two vulnerabilities from being exploited and used for remote code execution and denial-of-service attacks.
The FBI advised businesses to implement measures against Remote Desktop Protocol (RDP) brute force attacks. While considered a useful remote administration tool, cybercriminals also abuse it. Ways to defend against these threats.
To move forward, we need to look into the past to figure out what the best course of action is. Take a trip down memory lane with this infographic to see how far we've come in securing the digital world.
We came across a spam campaign targeting users with the BEBLOH banking trojan. We detected the rather quick campaign on October 24, over 90 percent of which were targeting Japanese-speaking users.
A critical factor contributing to the increasing expenses on mobile phones is fraud. Recently, the cost of criminal telecom equipment has decreased to the point that individuals can launch attacks. Read our report produced in collaboration with Europol.
Continued innovations in mobile technology enable businesses to respond to growing demands. Here are some best practices to make sure that the whole enterprise is protected against constantly evolving threats.