We analyzed the tools, relationships, and behaviors used in a long-standing intrusion of a company after its security team observed malicious C&C traffic.
The integration of the IoT and cloud computing poses new possibilities for industries. It is important not to overlook their respective security risks and the measures to take against them when the two technologies converge.
Les événements sismiques de 2020 ont apporté des changements durables dans les environnements de travail du monde entier et ont ouvert de nouvelles voies dont les cybercriminels peuvent user et abuser.
Many work-from-home employees use devices for personal and business purposes in home networks that are not as secure as that of the office. This article discusses the threats to unsecure IoT apps and provides ways to secure them.
The big move to the cloud has already happened for majority of enterprises and organizations who are invested in providing unhampered, future-proof services. But how can they prioritize visibility in a cloud-first world?
We discuss the present state of the malicious uses and abuses of AI and ML and the plausible future scenarios in which cybercriminals might abuse these technologies for ill gain.