Staying a Step Ahead of the Hack
Hackers, never at a loss for creative deception, have engineered new tactics for exploiting the weakest links in the cybersecurity chain: ourselves! Social engineering and business email compromise...
View ArticleRemote Work is Here to Stay, and Other Cybersecurity Predictions for 2021
The cybersecurity industry and end-of-year predictions go together like Fall and football or champagne and the New Year. But on the heels of an unprecedented year, where a viral outbreak changed the...
View ArticleCyber News Rundown: Trickbot Spreads Via Subway Emails
Trickbot spreading through Subway company emails Customers of Subway U.K. have been receiving confirmation emails for recent orders that instead contain malicious links for initiating Trickbot malware...
View ArticleHow to Build Successful Security Awareness Training Programs in 2021 and Beyond
Security awareness training is one of the most straightforward ways to improve a business’ overall resilience against cyberattacks. That is, when you get it just right. Thanks to the disruptions to...
View ArticleMaze Ransomware is Dead. Or is it?
“It’s definitely dead,” says Tyler Moffitt, security analyst at Carbonite + Webroot, OpenText companies. “At least,” he amends, “for now.” Maze ransomware, which made our top 10 list for Nastiest...
View ArticleCyber News Rundown: Gaming Industry in Crosshairs of Cybercriminals
Top gaming companies positioned to be next major cyberattack target After healthcare and higher education emerged as lucrative targets for cyberattacks in 2020, researchers have identified the video...
View ArticleEmployee Spotlight: The Human Faces Behind Artificial Intelligence
Webroot BrightCloud® Threat Intelligence relies on the collective power of millions of devices working together. But what sometimes gets lost is the actual humans behind bringing this technology to...
View ArticleCyber News Rundown: Cryptomining Malware Resurgent
Skyrocketing Bitcoin prices prompt resurgence in mining malware As the price of the cryptocurrency Bitcoin pushes record highs, there’s been a corresponding resurgence in cryptomining malware. Illicit...
View ArticleHow to Stop Shadow IT, Manage Access and Ensure Security with Cloud Applications
Today, the average enterprise uses over 2000 cloud applications and services, and we expect this number will continue to grow as more businesses realize the efficiency, flexibility and collaboration...
View ArticleCyber News Rundown: Dairy Farm Ransomware
Dairy farm group faces $30 million ransom The Dairy Farm Group, one of the largest retailers in Asia, has suffered a ransomware attack by the REvil group, which has demanded a roughly $30 million...
View ArticleFour Roadblocks to Increasing Employee Security Through User Training
We’ve been doing our homework, and two things seem to be true about cybersecurity awareness training simultaneously: It can be very effective at protecting businesses from one of the most common...
View ArticleEssential Threat Intelligence: Importance of Fundamentals in Identifying IOCs
The supply chain attack that Trojanized a SolarWinds update to infect and spy on the IT management platform’s customer base continues to be analyzed. Early reports have called the methods highly...
View ArticleHow IT Will Prevail in the 2021 Cyber-Demic
While we can all rejoice that 2020 is over, cybersecurity experts agree we haven’t seen the last of the pandemic-related rise in cyberattacks. Throughout the last year, we’ve seen huge spikes in...
View ArticleHacker Personas Explained: Know Your Enemy and Protect Your Business
In today’s rapidly evolving cybersecurity landscape, the battle for privacy and security is relentless. Cybercriminals are masters at using technology and psychology to exploit basic human trust and...
View ArticleThe NSA Wants Businesses to Use DoH. Here’s What You Need to Know.
Most people would categorically agree that increased privacy online is a good thing. But in practice, questions of privacy online are a bit more complex. In recent months, you’ve likely heard about...
View ArticleReducing the Time to Discovery: How to Determine if You Have Been Hacked
For most small businesses, the chances of falling prey to a long-term covert surveillance operation by well-resourced, likely state-backed actors are slim. To recap, that is what the evidence suggests...
View ArticleFools Rush in: 5 Things MSPs Should Know Before Adopting EDR
Buzzwords and acronyms abound in the MSP industry, an unfortunate byproduct of marketing years in the making. Cybersecurity is a hot watercooler topic at any business. Well, now probably more likely a...
View ArticleCyber News Rundown: Italian Banks Hit with Ursnif
Italy targeted by Ursnif banking Trojan Over 100 banks in Italy have fallen victim to the Ursnif banking trojan, which has stolen thousands of login credentials since it was first discovered in 2007....
View ArticleWho’s Hacking You?
One of the reasons why there’s so much cybercrime is because there are so many ways for cybercriminals to exploit vulnerabilities and circumvent even the best defenses. You may be surprised to find...
View Article3 Ransomware Myths Businesses Need to Stop Believing ASAP
Despite the rising ransomware numbers and the numerous related headlines, many small and medium-sized businesses (SMBs) still don’t consider themselves at risk from cyberattacks. Nothing could be...
View Article