Stats & Trends

Researcher Runs Coinhive Cryptominer in Excel Just Days After Microsoft Announces JavaScript Custom Functions

Microsoft made big news at 2018 Build when it announced JavaScript custom functions for Excel. Developers can use custom functions to work...

Read More
May 2018
Stats & Trends

5 Cybersecurity Statistics Every Small Business Should Know in 2018

As if small business owners didn’t already have enough on their plates, recent data indicates that SMBs actually suffer the lion's share of...

Read More
May 2018
Security Alert

Alert: Working Exploit Released for "Total Meltdown" Bug Introduced by Microsoft

Remember the simpler days? Before Meltdown and Spectre turned patching Windows systems into a complete mess?  This week the saga took yet another...

Read More
Apr 2018
Stats & Trends

5-Minute Highlights from Verizon's 2018 Data Breach Investigations Report

Every year, the incident response team at Verizon Enterprise Solutions releases their highly-anticipated Data Breach Investigations Report (DBIR),...

Read More
Apr 2018
How to

How to Respond to Incident Alerts in the New Barkly

In the old days of endpoint security, when you were using signature-based AV, incident alerts were clear cut. If your AV quarantined a file, you...

Read More
Apr 2018
Threats 101

Bad Education: As Cyber Attacks Against Schools Ramp Up, 5 Ways Districts Can Fight Back

Cyber criminals are rarely the evil geniuses pop culture makes them out to be. Mostly, they are opportunists who take advantage of vulnerabilities...

Read More
Apr 2018
Stats & Trends

6 Big Data Breaches in 5 Weeks, 4 Critical Security Lessons Learned

No organization wants to find itself in the tough position of disclosing a data breach. The consequences can be both immediate and long term, for...

Read More
Apr 2018
Stats & Trends

New Survey Reveals Endpoint Security Priorities

With the majority of today’s attacks actively evolving to become more evasive, security priorities are shifting. Advanced attack tools and...

Read More
Apr 2018
Barkly vs Malware

Multi-Stage Microsoft Word Attack Drops Trojan Without Using Macros 

Attackers are constantly experimenting with new ways to deploy malware without triggering detection. An increasingly common tactic is to conduct...

Read More
Apr 2018
Barkly vs Malware

New AVCrypt Ransomware Attempts to Uninstall Antivirus Software

Seemingly still under development, analysis from researchers MalwareHunterTeam, Michael Gillespie, and Lawrence Abrams suggests "AVCrypt" has been...

Read More
Mar 2018