Patches

Partner Content
Malware in attachment? Stop them before they hit your organization's security

Malware authors are continuously experimenting and employing new tactics to disguise their malware into email attachment. The key objective is to make the email look “normal” and “non-suspicious”, which will prompt the recipient to open the attachment without any suspicion.

Partner Content
Eternal Blue - A Prominent Threat Actor of 2017 - 2018

This paper outlines the usage of FuzzBunch exploit framework, details of MS17-010 patch, and insights into the EternalBlue Exploit and DoublePulsar payload. In addition to these, this paper also puts together the detection statistics of EternalBlue exploit after its inception in May, in various campaigns till date. 

Users attacked with malicious Office documents grew fourfold: Kaspersky

Attacks based on exploits are considered to be very powerful, as they do not require any additional interactions with the user and can deliver their dangerous code discreetly.

Partner Content
Here's the checklist of an efficient endpoint security solution

Most attacks on an organization can be traced back to devices connected to enterprise networks, which is basically an endpoint. And hence, that is why it is extremely important for an enterprise to ensure that their endpoints remain safe and secure.

Schneider Electric patches vulnerable applications

​A remote code execution vulnerability found in two Schneider Electric applications has been revealed by cyber security vendor Tenable.

Evaluating patch management software: 6 key considerations

Given the breadth of software systems in any given organization and the volume of patches being released by vendors, patch management software is a critical capability within IT environments today. Here's how to choose the tools that's right for you.

10 tips to minimize IoT security vulnerabilities

Online Trust Alliance spells out best practices for testing, purchasing, networking and updating IoT devices to make them and the enterprise more secure.

GrayKey: What you need to know about this iPhone hacker and how to protect yourself

Updated information about a turnkey, automated cracking system marketed to law enforcement makes it clear users should pick longer passcodes.

The clearer the CSO role, the easier to get budget approved: Mushtaq Ahmed, CSS Corp

For an organization to be secure from any cyber threats, investments should be made in technology, people, and policy, says Mushtaq Ahmed of CSS Corp.

MS Office vulnerabilities, unexplained outage puts Microsoft in a tough spot

The biggest software company in the world, Microsoft has had a rough month with significant spikes in targeted malware attacks and an out-of-the-blue Office 365 outage that threw enterprises out of gear all over the globe. 

Verizon report: Ransomware top malware threat of 2017, moving into critical systems

DDoS attacks are also on the rise, but spying reports are down. Fewer people are clicking on phishing links.

What hackers do: their motivations and their malware

Whether a hacker uses a computer exploit or malware, their motivations are the same. Understanding why and how hackers hack is key to your defense.