Featured Blogs
RDP Stands for “Really DO Patch!” – Understanding the Wormable RDP Vulnerability
During Microsoft’s May Patch Tuesday cycle, a security advisory was released for a vulnerability in the Remote Desktop Protocol (RDP)....
Reaching GDPR: A Partner Approach
As Raj Samani, Chief Scientist and Fellow at McAfee says, “It’s critical that businesses do everything they can to protect...
Read Before You Binge-Watch: Here are the TV Shows & Movies to Look Out For
If you’ve been following recent stay-at-home orders, it’s likely that you’ve been scavenging the internet for new content to help pass...
Ready, Set, Shop: Enjoy Amazon Prime Day Without the Phishing Scams
For many, Amazon Prime Day is an opportunity to score some great deals. For hackers, Amazon’s annual discount shopping campaign is an...
Recent Phishing Attacks Target Google Chrome Extensions, Spread Adware to 1 Million Users
Browser extensions help us out with our grammar, they allow us to video chat online, they even permit us to...
Red Kit an Emerging Exploit Pack
Exploit kits are toolkits that are used to build malware components such as binaries and scripts. They automate the exploitation...
Reddit Hacked? How to Regain Access and What to Change Immediately
It usually starts with a small, uneasy moment. A password reset email you don’t remember requesting. A login alert that doesn’t make sense. Strange comments showing up...
Redline Stealer: A Novel Approach
Authored by Mohansundaram M and Neil Tyagi A new packed variant of the Redline Stealer trojan was observed in the...
Reimagining mobile security for the way we live our lives today, tomorrow, and beyond.
Online is a little different for everyone How do you connect online these days? I’ll give you an example from my...
