Generative Data Intelligence

Tag: Defense

Russia-linked APT28 has been scanning vulnerable email servers in the last year

Experts warn of scanning activity conducted by Russia-linked APT28 cyberespionage group, hackers are searching for vulnerable mail servers. According to security researchers from...

APT28 Attacks Webmail and Microsoft Exchange Servers to Launch Sophisticated Spear Phishing Attacks

Pawn Storm having a group also known as APT28, Strontium, and Fancy Bear active since at least 2004, the group has targeted...

Five tips for managing remote workers during a pandemic

Is your organization ready to securely support a wide range of remote workers in the wake of a global pandemic? With cases of coronavirus...

Three federal agencies to defend energy infrastructure from Cyber Attacks

The Energy infrastructure in the United States from now on will be defended by the Departments of Energy and Homeland Security...

APT28 has been scanning vulnerable email servers for more than a year

APT28's new tactics show that this particular threat actor can't be pigeonholed within a particular threat matrix and will most likely diversify its...

Thousands of These Computers Were Mining Cryptocurrency. Now They’re Working on Coronavirus Research

CoreWeave, the largest U.S. miner on the Ethereum blockchain, is redirecting the processing power of 6,000 specialized computer chips toward research to find...

4 Phishing Protection Gaps that SEGs Cannot Address

A Markets Insider article cited a Cofense report (2019 Phishing Threats and Malware Review) that highlighted some interesting, though not surprising, findings....

What is the Best Defense Against Phishing Attacks?

The administrator of your personal data will be Threatpost, Inc., 500 Unicorn Park, Woburn, MA 01801. Detailed information on the processing of personal...

Hackers Created Thousands of Coronavirus (COVID-19) Related Sites As Bait

As the world comes to grips with the coronavirus pandemic, the situation has proven to be a blessing in disguise for threat actors,...

How to Protect Your VPN: Lessons From a DDoS Attack Test

I have worked remotely for 15+ years in three different jobs. Although I am not as dependent on my remote VPN client...

Increase web application security without causing any user disruption

In this podcast recorded at RSA Conference 2020, Jason A. Hollander, CEO, and Paul B. Storm, President at Cymatic, talk about how their...

Cybersecurity Predictions for Profitability During COVID-19 Pandemic

#KILLTHEVIRUS #SAVEHUMANITY #GROWYOURPROFITS #BEBOUNTIFULThe world-wide pandemic – COVID-19 aka ‘the novel corona virus’ affects us all globally.  It’s going to take a ‘miracle’...

Latest Intelligence

spot_img
spot_img
spot_img