Malware: Old Tools; New Tricks
Since the earliest form of a computer virus was created in 1949, malware has certainly come of age. Malware continues to wreak havoc on corporate and government entities and remains a perpetual thorn in the side of vendors and IT
How EDR Solutions are Bolstering Cybersecurity Defenses
Endpoint Detection and Response (EDR), also referred to as endpoint detection and threat response (EDTR), is an endpoint security solution that continuously monitors end-user devices to detect and respond to cyber threats like ransomware and malware. Coined by the ex-Gartner Analyst
How Does the Cyber Mercenary Business Work?
The Cyber Mercenary Business is Surging, Unfortunately Reuters wrote a report on the booming business of Cyber mercenaries which we found particularly interesting and thought it was well worth sharing. The report discusses in detail, various cyber mercenary hacks which have
Ransomware and Business Email Compromise (BEC) Account for 70% of Breaches
Ransomware and business email compromises (BEC) topped the list of the types of attacks on organizations in the past year, making up 70% of the total number, according to the 2022 Unit 42 Incident Response Report from Unit 42 by