Featured Blogs
CVE-2012-0158 Exploit in the Wild
Since last week, we have seen many specially crafted files exploiting CVE-2012-0158, a vulnerability in MSCOMCTL.OCX in Microsoft Office and...
Customer Support Scams Are Popping up in Social Media Ads: How to Stay Secure
Many of us rely on customer support websites for navigating new technology. Whether it’s installing a new piece of software or...
CurveBall – An Unimaginative Pun but a Devastating Bug
Enterprise customers looking for information on defending against Curveball can find information here. 2020 came in with a bang this...
Current Campaign Delivers Hundreds of Thousands of Polymorphic Ransomware
You might have been getting out of bed when attackers started sending hundreds of thousands of fake invoices the morning...
Curbing The Threat Of Fake Accounts
My bubbly teen was so excited the day she found Priyanka Chopra had started following her on Twitter. She was...
CU46, S2R, TBH, Lit: Updated Texting Slang Parents Should Know
You may have noticed your teen using a whole new pack of words when texting and talking these days. It’s...
CSI: Evidence Indicators for Targeted Ransomware Attacks – Part II
In our first article we discussed the growing pattern of targeted ransomware attacks where the first infection stage is often...
CSI: Evidence Indicators for Targeted Ransomware Attacks – Part I
For many years now I have been working and teaching in the field of digital forensics, malware analysis and threat...
CryptoWall V3 and V4 Protection for McAfee Customers
Updated, November 6: Since October 30, the release date of the Cyber Threat Alliance report on CryptoWall Version 3, we...