Trends & Reports September 24, 2019 CloudLIVE Conference Highlights Strategies for Battling Multicloud Complexity The second annual CloudLIVE conference starts in Boston tomorrow and consists of two days of mainstage events and breakout track sessions covering a broad range ... Read more
Tools & Practices September 20, 2019 MITRE Corporation Publishes List of Top 25 Most Dangerous Software Errors and Vulnerabilities The MITRE Corporation has published a list of the most dangerous software errors and vulnerabilities. It has been 8 years since the last list was ... Read more
Security Breaches September 19, 2019 SMBs are Underestimating Damage Caused by a Cyberattack AppRiver has published the results of its Q3 Cyberthreat Index for Business Survey, which have revealed that SMBs are underestimating the consequences of a successful ... Read more
Trends & Reports September 19, 2019 SpamTitan Named Leader in G2 Crowd 2019 Summer Grid Report for Cloud Email Security The independent business software review platform, G2 Crowd, has named SpamTitan leader in cloud email security in its Grid Summer 2019 Report. This is the ... Read more
Tools & Practices September 18, 2019 New Distribution Agreement Between GFI Software and Infinigate GFI Software has announced it has signed a new distribution agreement with Infinigate, one of Europe’s largest Value Added Distributors. GFO Software already has distribution ... Read more
Security Breaches September 18, 2019 Emotet is Back in Action and Delivering TrickBot and Ryuk Ransomware It has been all quiet on the Emotet front for the past four months, but the infamous botnet is back with a vengeance. A large-scale ... Read more
Trends & Reports September 13, 2019 Don’t Neglect the Human Factor – Employee Security Awareness Training is Essential Cybercriminals are attacking businesses by exploiting the weakest link in the security chain – Employees. Attacks exploiting the human factor are far easier to pull ... Read more
Cyber Threats September 12, 2019 Exploit Kit Activity Increases: 4 New Malvertising Campaigns Detected Exploit kit activity may not be at the level seen in 2016, but the malicious website toolkits are enjoying something of a resurgence. New exploit ... Read more
Cyber Threats September 11, 2019 Weaponized BlueKeep Exploit Released A weaponized exploit for the BlueKeep vulnerability has been published online by security researchers at Rapid7 and Metasploit. BlueKeep – CVE-2019-0708 – is a wormable ... Read more
Compliance September 10, 2019 Two Thirds of UK Employees Do Not Receive Regular Email Security Training A recent study by cybersecurity firm Tessian suggests two thirds of UK employees do not receive regular email security training in the workplace. Consequently, UK ... Read more
Cyber Threats September 6, 2019 Flaws in GPS Trackers Can be Exploited to Reveal the Location of Children Many parents are using GPS trackers to monitor the location of their children, but a recent study conducted by researchers at Avast Threat Labs has shown ... Read more
Security Breaches September 4, 2019 43% of UK SMEs Have Experienced an Email Impersonation Attack in the Past 12 Months 43% of UK small and medium-sized enterprises (SMEs) in the United Kingdom have experienced a business email compromise (BEC) or email impersonation attack in the ... Read more
Security Breaches September 2, 2019 Digital Extortion and Fileless Malware Attacks Have Soared in 1H, 2019 The first 6 months of 2019 have seen significant increases in business email compromise (BEC) attacks, ransomware attacks, and other forms of cyber extortion, according ... Read more
Insights September 2, 2019 Best Spam Filter for Outlook Microsoft Outlook is a popular email client, but many businesses have reported receiving excessive volumes of spam in their inboxes which has led them to ... Read more
Insights September 2, 2019 Cloud-Based Spam Filters Businesses looking to improve their defenses against phishing, malware, ransomware, and spam can choose a physical appliance, a software solution housed on their own hardware, ... Read more
Insights September 2, 2019 Top Anti Spam Software Email is the primary vector used for phishing and distributing malware, botnets, viruses, and ransomware, so businesses need to have a top anti spam software ... Read more
Insights September 2, 2019 Best Anti Spam Software It is important to spend some time assessing the best anti spam software solutions on the market to ensure they are suitable for your business ... Read more
Insights September 2, 2019 Anti-Spam Software The first rudimentary anti-spam software was developed in the mid-1990s in response to an increase in bulk, unsolicited emails. The system consisted of little more ... Read more
Tools & Practices August 29, 2019 Malicious CamScanner App Downloaded by 100 Million Users Users of the free version of the CamScanner app have been advised to uninstall the app immediately, following the discovery of a hidden Trojan Dropper ... Read more
Security Breaches August 28, 2019 Multi-Factor Authentication Stops 99.9% of Automated Cyberattacks A new report from Microsoft suggests 99.9% of all automated cyberattacks on Microsoft platforms and other online services are blocked by multi-factor authentication, highlighting the ... Read more
Cyber Threats August 27, 2019 Apple Fixes Critical Jailbreak Vulnerability… Again A patch has been released to address a critical jailbreak vulnerability in iOS 12.4. The flaw is a use-after-free vulnerability affecting the iOS kernel and ... Read more
Cyber Threats August 27, 2019 IRS Warns of Phishing Scam Targeting Taxpayers and Tax Professionals The Internal Revenue Service (IRS) has issued a warning to U.S. taxpayers and tax professionals about a new nationwide phishing campaign that is spreading keylogging ... Read more
Compliance August 22, 2019 Researchers Provide Insights into Motivations Behind Healthcare Cyberattacks A new report from FireEye provides insights into the motivations behind cyberattacks on U.S. healthcare organizations. The report shows patient information is not the only ... Read more
Security Breaches August 21, 2019 Study Highlights Risk of Lateral Phishing Attacks Phishing is the use of impersonation to trick another person into disclosing sensitive information. Phishing can take place over the Internet, telephone, or via text ... Read more
Trends & Reports August 19, 2019 Custom 404 Pages Used to Serve Fake Microsoft Office 365 Login Forms A new phishing campaign has been detected by security researchers at Microsoft that uses custom 404 pages to display a fake Office 365 login form. ... Read more
Security Breaches August 19, 2019 Texas Ransomware Attack Affects 23 Government Agencies The Texas Department of Information Resources (DIR) has issued a statement confirming the state has experienced a major ransomware incident that has affected multiple agencies. ... Read more
Tools & Practices August 16, 2019 GFI Software Nets Network Product Guide Silver Award for GFI Unlimited GFI Software has been recognized by Network Products Guide as one of the Hot Companies of the Year in the 14th Annual IT World Awards, ... Read more
Security Breaches August 14, 2019 Xwo Web Scanner Used to Identify Unprotected MongoDB Databases Security researchers at AT&T Alien Labs have identified a new ‘malware’ variant that is being used to identify potential targets. The web scanner has been ... Read more
Tools & Practices August 14, 2019 August 2019 Patch Tuesday Sees More Than 90 Vulnerabilities Patched August 2019 Patch Tuesday has seen Microsoft issue fixes for 93 vulnerabilities across Windows, Microsoft Browsers, Microsoft Office, and Outlook. 26 of the vulnerabilities have ... Read more
Cyber Threats August 8, 2019 New Threat Intelligence Report Provides Insights into Email-Based Malware Attacks A new report has been released that contains an analysis of the most common malware threats that are delivered via email, the most targeted industry ... Read more