What happens to an unpatched or vulnerable application or organization’s IT infrastructure? Here's how virtual patching helps enterprises address vulnerability and patch management woes.
PowerShell's ubiquity has made it one of the most common tools cybercriminals abuse to perpetrate attacks and deliver fileless malware to systems. Here's how to track and defend against them.
Many attackers are switching from file-based malware to memory-based attacks to improve their stealth. “Fileless,” “zero-footprint,” or “living off the land” threats use legitimate applications to carry out malicious activities.
There has been an influx of employees signing in remotely to corporate networks and using cloud-based applications. But this shift could also open doors to security risks. Where should security fit in?
A zero-day attack exploits an unpatched vulnerability. Until a patch becomes available, it is often a race between threat actors trying to exploit the flaw and vendors or developers rolling out a patch to fix it.
Fileless threats aren’t as visible compared to traditional malware and employ a variety of techniques to stay persistent. Here's a closer look at how fileless malware work and what can be done to thwart them.
The WEP and WPA2 wireless security protocols have both been discovered with vulnerabilities such as KRACK that hackers can exploit to compromise devices, spy on users, and perform other malicious activities. How can users secure their wireless connections?
For an age group that’s known for being tech-savvy, most aren’t paying much attention to securing their privacy and personal information. What can incoming students do to improve their cybersecurity?
The Federal Bureau of Investigation (FBI) released a public service announcement earlier this year warning about Business Email Compromise (BEC) schemes. Here’s what you need to know, and what you can do to prevent attacks.