The German Federal Criminal Police Office (BKA), in cooperation with the Central Office for Combating Internet Crime (ZIT), has dealt a severe blow to…
Cloud Security
-
-
A common feature in all of the malicious documents Cisco Talos took apart is the existence of four non-malicious VBA subroutines. These subroutines appeared…
-
Cloud SecurityNewsSecurity
The US offers a $2.5M bounty for the arrest of Angler Exploit Kit co-distributor
Angler employed advanced evasion techniques, including checking for virtual machines and sandbox environments to avoid detection by security researchers, leading to its popularity and…
-
“Switching to shorter life cycles of certificates significantly reduces these risks and is a necessary step.” Venafi chief innovation officer Kevin Bocek said. However,…
-
Deepfakes as credit risks It’s not just cybersecurity experts who are warning of the corporate risk from deepfakes. In May, credit ratings firm Moody’s…
-
Cloud SecurityNewsSecurity
Whitelisting explained: How it works and where it fits in a security program
What is whitelisting? Whitelisting is a cybersecurity strategy under which only pre-approved or trusted users, entities, or actions are allowed to operate on a…