Users of Apache Struts are encouraged to make a necessary update to prevent two vulnerabilities from being exploited and used for remote code execution and denial-of-service attacks.
The FBI advised businesses to implement measures against Remote Desktop Protocol (RDP) brute force attacks. While considered a useful remote administration tool, cybercriminals also abuse it. Ways to defend against these threats.
To move forward, we need to look into the past to figure out what the best course of action is. Take a trip down memory lane with this infographic to see how far we've come in securing the digital world.
We came across a spam campaign targeting users with the BEBLOH banking trojan. We detected the rather quick campaign on October 24, over 90 percent of which were targeting Japanese-speaking users.
A critical factor contributing to the increasing expenses on mobile phones is fraud. Recently, the cost of criminal telecom equipment has decreased to the point that individuals can launch attacks. Read our report produced in collaboration with Europol.
Continued innovations in mobile technology enable businesses to respond to growing demands. Here are some best practices to make sure that the whole enterprise is protected against constantly evolving threats.
California enacted the first IoT cybersecurity law in the U.S. It sets security requirements for manufacturing connected devices to be released into the market.
Security researchers further shed light on VPNFilter’s additional modules whose capabilities could’ve been used for future attacks, while a new IoT botnet has emerged - Torii.