Anatomy Of an Endpoint Attack: How A Cyberattack Can Compromise an Enterprise Network
By Guillermo Gomez, Vice President of Endpoint Product, WatchGuard Technologies For truly effective network security posture, it’s crucial to protect…
By Guillermo Gomez, Vice President of Endpoint Product, WatchGuard Technologies For truly effective network security posture, it’s crucial to protect…
The Ukraine CERT-UA warns of a concerning increase in cyberattacks attributed to the financially-motivated threat actor UAC-0006. The Computer Emergency…
By Theresa Le, Chief Claims Officer, Cowbell As cyber threats escalate and evolve worldwide, businesses must ensure their foundations are…
A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs are free…
Malicious actors compromised the JAVS Viewer installer to deliver the RustDoor malware in a supply chain attack. Rapid7 researchers warned…
Threat actors used fake AV websites masquerading as legitimate antivirus products from Avast, Bitdefender, and Malwarebytes to distribute malware. In…
By Guillermo Gomez, Vice President of Endpoint Product, WatchGuard Technologies For truly effective network security posture, it’s crucial to protect…
The MITRE Corporation revealed that threat actors behind the December 2023 attacks created rogue virtual machines (VMs) within its environment.…
As the UK mulls new rules for ransomware disclosure, what would be the wider implications of such a move, how…
GitLab addressed a high-severity cross-site scripting (XSS) vulnerability that allows unauthenticated attackers to take over user accounts. GitLab fixed a…