Cybersecurity Blog


Subscribe

Posts tagged: Malware

Category: Cybersecurity

Microsoft Vulnerability Left Unpatched for Months

Microsoft Vulnerability Left Unpatched for Months


Posted February 21, 2017 in Data Breach, Malware, Compliance

Google's Project Zero exposed a critical Microsoft vulnerability after Microsoft failed to patch it. Learn why...

Trump Campaign Website Hacked: What Happened

Trump Campaign Website Hacked: What Happened


Posted February 20, 2017 in Data Breach, Malware, Cloud Security

An official Trump campaign fundraising website was compromised by hackers. Learn what was exposed and why political...

Work Email Is More Dangerous Than Personal Email

Work Email Is More Dangerous Than Personal Email


Posted February 20, 2017 in Malware, Data Breach, Cryptocurrency

Analysis of 1 billion+ emails reveals work email carries far more threats than personal accounts. Discover why...

Yahoo Hack Bypasses Passwords Using Forged Cookies

Yahoo Hack Bypasses Passwords Using Forged Cookies


Posted February 16, 2017 in Data Breach, Digital Forensics, Malware

Hackers breached Yahoo accounts without passwords by forging authentication cookies. Learn how this attack bypassed...

Brute Force Attacks Spread Ransomware Fast

Brute Force Attacks Spread Ransomware Fast


Posted February 15, 2017 in Ransomware, Malware, Data Breach

Hackers use brute force attacks to breach small business networks and deploy Crysis ransomware. Learn how these...

Critical WordPress Vulnerability: Update Now

Critical WordPress Vulnerability: Update Now


Posted February 14, 2017 in Malware, Data Breach, Cloud Security

A critical WordPress security flaw puts millions of websites at risk. Learn why you must update immediately and how...

Word Macro Malware Now Targets Mac Computers

Word Macro Malware Now Targets Mac Computers


Posted February 10, 2017 in Malware, Data Breach, AI

Hackers expanded Word macro malware from Windows to Mac. Discover how this cross-platform threat works and what Mac...

Fileless Malware: The Invisible Threat

Fileless Malware: The Invisible Threat


Posted February 9, 2017 in Malware, Data Breach, Cloud Security

Fileless malware evades antivirus by running entirely in memory without copying files to your hard drive. Learn how...

CEO Fraud: 2 More Companies Fall Victim

CEO Fraud: 2 More Companies Fall Victim


Posted February 7, 2017 in HIPAA, Data Breach, Malware

Two more companies lost sensitive data to CEO fraud scams where criminals impersonated executives. Learn how business...

Fake Netflix App Spreads Dangerous Malware

Fake Netflix App Spreads Dangerous Malware


Posted February 6, 2017 in Ransomware, Malware, Data Breach

A fake Netflix app promising free access is actually malware designed to steal your data. Learn how to spot...

Ransomware Shuts Down Entire County Government

Ransomware Shuts Down Entire County Government


Posted February 3, 2017 in Ransomware, Malware, Data Breach

Licking County, Ohio was forced offline by a ransomware attack that crippled police and government offices. Learn how...

Ransomware Evolution: Why Threats Are Worse

Ransomware Evolution: Why Threats Are Worse


Posted February 1, 2017 in Ransomware, Malware, Data Breach

Ransomware is evolving from a nuisance into a devastating business threat. Discover why attacks are more dangerous...