Viruses

MS Office vulnerabilities, unexplained outage puts Microsoft in a tough spot

The biggest software company in the world, Microsoft has had a rough month with significant spikes in targeted malware attacks and an out-of-the-blue Office 365 outage that threw enterprises out of gear all over the globe. 

What hackers do: their motivations and their malware

Whether a hacker uses a computer exploit or malware, their motivations are the same. Understanding why and how hackers hack is key to your defense.

Trend Micro detects and blocks 3.4mn high-risk email threats in 2017

Cloud App Security managed to detect over 50,000 ransomware and 3,000 BEC threats in the last three quarters of 2017.

Three out of four organizations lack proper incident response plans: IBM-Ponemon report

There’s no denying that fortifying defenses is the first step to cyber-resiliency. What takes a back seat though, is the lack of proper incident response plans. IBM-Ponemon’s 2018 cyber-resiliency study reveals 77 percent of firms lack proper incident response plans.

SWIFT misuse: Why RBI's missive to Indian banks matters

RBI has set April 30th as the deadline for banks to link their CBS with SWIFT. Here are five cases of SWIFT misuse that led to a cybersecurity nightmare, which could have been avoided.

Aadhaar hack encore: Basic SQL injection exposes 96 lakh accounts

A security researcher brings to light the absolute ease with which Aadhaar data can be accessed.

How MSSPs can address the cybersecurity talent gap

Managed security services providers can help companies struggling to fill security roles.

Partner Content
The big security threats your organization needs to take seriously now

This whitepaper promises to peel the veil back and take a no-holds-barred, brutally honest view at security risks for your enterprise. 

Microsoft's Windows Defender antimalware targets scareware apps

While Microsoft's Windows Defender frowned upon "optimizer" or "cleaner" apps that didn't explain what they did, it's drawing the line on "scareware" apps that tell you that your PC will be ruined if you don't pay up.

The most sought after cybersecurity skills in 2018

The ever-evolving threat landscape has made it imperative for security professionals to stay on top of the latest security tools. Here’s a look at the most sought after cybersecurity skills in 2018

Emerging technologies to combat new age threats

Given the new age threat landscape, CIOs and CSOs across the board can no longer bank upon a fortified periphery that would protect the organization’s crown jewels.

6 ways hackers will use machine learning to launch attacks

Machine learning algorithms will improve security solutions, helping human analysts triage threats and close vulnerabilities quicker. But they are also going to help threat actors launch bigger, more complex attacks.