Whitelisted Sites Are Being Used to Deliver Malware
Malicious Cyber Actors increasingly exploit seemingly legitimate whitelisted sites to deliver malware, utilizing our own tools and trust against us.
Malicious Cyber Actors increasingly exploit seemingly legitimate whitelisted sites to deliver malware, utilizing our own tools and trust against us.
zvelo’s brief recap of the SANS Dallas event – plus 5 key cybersecurity actions that you should take to improve your organization’s security.
zvelo Cybersecurity Recap- SnowFROC is an application security conference designed to help developers and technologists improve the security of software.
Unpatched vulnerabilities cause one third of breaches. 34% of all vulnerabilities reported so far this remain unpatched. How are you mitigating your risks?
Implementing critical security policies is one thing, but enforcing them is an uphill battle. Here are 5 security battles worth fighting to enforce.
As more and more companies are pursuing “Data as a service” or “DaaS” business models, we wanted to share our experiences on the DaaS business model, with a specific focus on the challenges of Intellectual Property Rights (IPR) protections for DaaS data.
The introduction of voice-activated smart home solutions – like Amazon Echo and Dot, Google Home, and Apple’s HomePod
Earlier this week, over 14 million Verizon customers had sensitive user data associated with their Verizon accounts released into the wild. A third-party vendor had stored the database on an improperly secured cloud server. While this unsecured server was located in the Amazon Web Services (AWS) cloud, the data breach was determined to be a result of human error on the contractor’s part, not any inherent security vulnerability in the AWS cloud.
Earlier this month WannaCry was named the world’s biggest cyberattack which hit at over 150 countries and infected over 300,000 machines across hospitals, universities, manufacturers, government agencies and other important centers.
On an increasingly massive scale, cybercriminals are repurposing connected Internet of Things (IoT) devices installed within our homes. These hackers use malware to enlist our smart thermostats, speakers, lights, and more as soldiers for their botnet armies – used in coordinated massive attacks causing security breaches that threaten the integrity of the internet.