Security Alert

New Sextortion Scam Flaunts Real Passwords, Rakes in $50,000 in a Week

In a new twist to an old scam, criminals are sending out emails claiming they've infected the recipients’ computers with malware and have used their webcam to record video of them watching porn....

Read More
Featured
Threats 101

LOLBins: Attackers Are Abusing Trusted Binaries to Target Organizations

Trust is one of the key pillars information security is built on. It’s ultimately what determines who has access to what, which applications are...

Read More
May 2018
Threats 101

What Makes SamSam, the Ransomware that Crippled Atlanta, So Different

When news broke on March 22 that the City of Atlanta was grappling with a ransomware infection, it understandably made national headlines. Here...

Read More
May 2018
Threats 101

Bad Education: As Cyber Attacks Against Schools Ramp Up, 5 Ways Districts Can Fight Back

Cyber criminals are rarely the evil geniuses pop culture makes them out to be. Mostly, they are opportunists who take advantage of vulnerabilities...

Read More
Apr 2018
Threats 101

March Malware Madness: Pit Your Security vs. 4 Types of Attacks

It's that time of year again. If your office is like most, for the next two weeks it's likely getting swept up in March Madness. But while...

Read More
Mar 2018
Threats 101

5 Ransomware Attack Postmortems (new eBook)

These days it's unfortunately all too common to see ransomware attacks in the headlines, but typically when you dig into the articles details...

Read More
Aug 2017
Threats 101

Petya, NotPetya? A Definitive FAQ

There's been no lack of twists and turns in the still-developing story of this week's global malware outbreak. In the rush to provide new...

Read More
Jun 2017
Threats 101

Polymorphic Malware: How to Spot and Stop this Shapeshifting Menace

Traditional endpoint security has been a high-stakes game of whack-a-mole: attackers create new malware, anti-virus vendors create new signatures...

Read More
May 2017
Threats 101

Macro Malware that Bypasses AV: What You Need to Know

Unless you’re a newbie to the IT security business, you probably remember when Microsoft Office macros became one of the most popular means of...

Read More
May 2017
Threats 101

Beyond the Hype of Fileless Malware: A Barkly Malware Research Chat

 In this week’s chat, the malware research team looks at the recent spikes in fileless malware attacks and answers questions from IT pros who want...

Read More
Mar 2017
Threats 101

Cerber Ransomware: Everything You Need to Know

Of all the new ransomware strains that burst onto the scene in 2016, Cerber stands out in several notable ways...  

Read More
Mar 2017