Featured Blogs
The 2019 Job Seeker & The Cybersecurity Skills Shortage
In today’s ever-changing job market, job seekers and employers alike are under a great deal of pressure. Those looking for...
TeslaCrypt Ransomware Arrives via Neutrino Exploit Kit
This post was written by Sriram P. and Varadharajan Krishnasamy. TeslaCrypt is a ransomware family that encrypts files and extorts money...
Teslacrypt Joins Ransomware Field
A newly crafted ransomware, Teslacrypt, has arrived in the malware genre that encrypts user files using AES encryption and demands...
Technical Support Scams – What to look out for
Authored by Oliver Devane Technical Support Scams have been targeting computer users for many years. Their goal is to make...
Targeted Ransomware No Longer a Future Threat
This post was written by Christiaan Beek and Andrew Furtak. In 2015, McAfee investigated a ransomware campaign that targeted the...
Targeted Attacks, Stolen Certificates, and the Shiqiang Gang
This blog post was written by Rahul Mohandas. The trend of attackers using stolen digital certificates to disguise their malicious...
Targeted Attacks on French Company Exploit Multiple Word Vulnerabilities
Spear phishing email is a major worry to any organization. Messages that appear legitimate and specific fool us more often...
Talking About Cyber Risks Educates the Community
In the last 12 months, we have seen an unprecedented number of cyberattacks occur or come to light. Sophisticated attacks against...
Tales From the Trenches; a Lockbit Ransomware Story
Co-authored by Marc RiveroLopez. In collaboration with Northwave As we highlighted previously across two blogs, targeted ransomware attacks have increased...