Stolen Memories: Why cyber thieves attack personal over financial data
In the never-ending war against cybercrime, half the battle lies in raising public awareness about the nature of the threats out there. If everyday computers users are more clued into the security and...
View ArticleThis Week in Security News
Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. Below you’ll find a quick recap of topics followed by...
View ArticleTippingPoint Threat Intelligence and Zero-Day Coverage – Week of April 3, 2017
Late last week, a buffer overflow vulnerability in IIS 6.0 on Windows 2003 servers, identified by CVE-2007-7269, was publicly disclosed. The vulnerability can be exploited since no bounds checking is...
View ArticleWorry-Free Services, powered by XGen™ Security
According to a recent committee hearing by the House Small Business Committee, nearly 60 percent of small companies go out of business within six months following a hack and 71 percent of all cyber...
View ArticleWhy Scammers Want Your Tax Returns (and how to stop them)
It’s almost here – April 18, tax day in the U.S. As businesses and employees prepare their tax returns, cybercriminals are once again ramping up efforts to steal this information, and they are getting...
View ArticleThis Week in Security News
Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. Below you’ll find a quick recap of topics followed by...
View ArticleTippingPoint Threat Intelligence and Zero-Day Coverage – Week of April 10, 2017
Earlier this week marked the end of support for Windows Vista. This means anyone using Vista will no longer receiving new security updates, non-security hotfixes, free or paid assisted support options,...
View ArticleBig data and machine learning: A perfect pair for cyber security?
Online threats are emerging at a faster rate than ever. Between June and November of 2016, Malwarebytes discovered that almost 1 billion malware-based incidences occurred. These malicous programs...
View ArticleSetting Sail with Docker
This week thousands of people are heading to Austin, Texas for DockerCon 2017. Docker’s popularity has been explosive, with thousands of organizations using it’s platform to modernize applications,...
View ArticlePragmatic Hybrid Cloud Security
It’s easy to get lost in a sea of marketing terms. Recently “Hybrid Cloud” has bubbled up more and more. The good news here is that the term is an accurate and useful way to describe the reality that...
View Article4 ways mobile devices still threaten your business
Mobile devices have been commonly used in corporate environments for decades – bulky portable telephones, heavy laptops and PDAs. Then along came Apple and the smartphone, and soon everyone either had...
View ArticleThis Week in Security News
Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. Below you’ll find a quick recap of topics followed by...
View ArticleTippingPoint Threat Intelligence and Zero-Day Coverage – Week of April 17, 2017
I’ve never been one to adopt the latest fashion trends, aside from what I wore growing up in the 1980s. I wore shoulder pads, blue eyeliner, designer jeans, and even parachute pants. While I continue...
View ArticlePawn Storm: The Power of Social Engineering
In our latest report on Pawn Storm (a.k.a. APT28, Fancy Bear, Strontium, etc.), researchers expose the scope and scale of the cyber espionage group’s attacks but more importantly their cyber...
View ArticleA Storm’s a Coming: How businesses can defend against threat actor groups...
Pawn Storm (aka Sednit5, Fancy Bear, APT28, Sofacy and STRONTIUM8) might sound like Instagram accounts, top-secret spy programs or recently passed legislation, but in reality they are all different...
View ArticleLinux is secure…right?
“There are no threats for Linux servers. Aren’t they built to be secure?” “Linux servers are so secure and hardened, why do we need security controls on those?” “I do understand there are threats out...
View ArticleMachine learning and the fight against ransomware
Ransomware is now everywhere. The number of emails containing ransomware rose 6,000 percent since 2015, and in 2016, 40 percent of all spam emails had one of these malicious programs hidden within,...
View ArticleTrend Micro and INTERPOL: Teaming Up Again to Fight Global Cybercrime
At Trend Micro we have a long history of partnering with law enforcement whenever called upon. We believe that the skills and resources of the private sector can offer allow law enforcement to surge...
View ArticleTippingPoint Threat Intelligence and Zero-Day Coverage – Week of April 24, 2017
There was a time when a person’s motivation to hack something was for financial reasons or for street cred. But now we’re seeing organizations that have other motivations. Pawn Storm is a...
View ArticleThis Week in Security News
Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. Below you’ll find a quick recap of topics followed by...
View Article