Phishing

Users attacked with malicious Office documents grew fourfold: Kaspersky

Attacks based on exploits are considered to be very powerful, as they do not require any additional interactions with the user and can deliver their dangerous code discreetly.

Partner Content
Spotted unusual activity on network: Here's what to do next

Just like the physical world, prevention is better than cure and in the case of the cyber world, having the proper defence in place goes a long way in securing an enterprise network.

Negligent Employee: A dangerous internal cyber threat

As organizations cope with the changing world of cybersecurity which continues to evolve at a frantic pace, they sometimes forget to neglect the danger that stares at them in their face.

Cloud and Security aren’t chalk and cheese: Andrew Littleproud, CrowdStrike

CrowdStrike’s cloud-delivered end point story outshines the traditional approach by the security vendors, says Andrew Littleproud, VP APJ, CrowdStrike.

5 signs you've been hit with an advanced persistent threat

Do you have valuable data on your network? Noticing odd network behavior? You could be the victim of an APT attack

What is cross-site scripting (XSS)? Low-hanging fruit for both attackers and defenders

With XSS, attackers enter malicious code into a web form or web app URL to trick the application into doing something it's not supposed to do.

Asia and Middle East a hotbed of new threat actors in Q1, 2018

Kaspersky Lab’s latest quarterly threat intelligence summary reveals a wave of new APT activity based mainly in Asia and the Middle East, with a number of new techniques used by actors.

Microsoft announces security innovations to help manage threats from cloud to edge

Amid evolving digital threats, an innovative IoT security solution, integrated threat intelligence and advanced protection in Microsoft 365 help simplify cybersecurity for businesses.

The clearer the CSO role, the easier to get budget approved: Mushtaq Ahmed, CSS Corp

For an organization to be secure from any cyber threats, investments should be made in technology, people, and policy, says Mushtaq Ahmed of CSS Corp.

What is DNS and how does it work?

The Domain Name System resolves the names of internet sites with their underlying IP addresses adding efficiency and even security in the process.

Verizon report: Ransomware top malware threat of 2017, moving into critical systems

DDoS attacks are also on the rise, but spying reports are down. Fewer people are clicking on phishing links.

Sophos introduces Phish Threat attack simulator and training solution

xPhish Threat simplifies a key part of an organizations security strategy- employee awareness and training.