Security, Threat Intelligence Hub
Exploit Using Microsoft Excel Power…
Mimecast Threat Center discovered a weak…
Read More >
Mimecast Threat Center discovered a weakness in the Microsof… Read More >
Spam emails may be merely troublesome—but can also be dangerous. Businesses that use… Read More >
Spam emails may be merely troublesome—but can also be dangerous. Businesses that use Gmail can help employees block spammers for good with these guidelines. Key Points: Spam emails can be infected with malware and compromise a user account’s security and privacy. To stop spam, companies… Read More >
Fighting online brand exploita… Read More >
Fighting online brand exploitation manually is expensive and ineffective. Automated solutions provide the holistic prote… Read More >
Learn about the types of web application attacks, how they can affect your business’… Read More >
Learn about the types of web application attacks, how they can affect your business’s websites and applications, and how to defend against them. Key Points: Web applications can be vulnerable to attacks, which can allow cyber criminals to gain access to data and other sensitive information. C… Read More >
Rising ransomware attacks due … Read More >
Rising ransomware attacks due to shifting working patterns are the new normal, requiring a balance of security and… Read More >
New Mimecast research shows thousands of fake websites are already spoofing top brands and… Read More >
New Mimecast research shows thousands of fake websites are already spoofing top brands and poaching customers for illicit gain this holiday season. Key Points: Online brand exploitation usually surges during the holidays, diverting customers to criminals’ sites to steal credit cards, sell cou… Read More >
Discover what reverse social e… Read More >
Discover what reverse social engineering is and how it differs from social engineering. Learn ways to mitigate reverse s… Read More >
Mimecast Threat Center discovered a weak…
Read More >
Mimecast Threat Center discovered a weakness in the Microsof… Read More >
Since the dawn of social engineering, at…
Read More >
Since the dawn of social engineering, attack methodology has… Read More >
With Cybersecurity Awareness Month here,…
Read More >
With Cybersecurity Awareness Month here, we’re ready t… Read More >
Get posts like this delivered to…
Read More >
Get posts like this delivered to your inbox. Subscri… Read More >
In the episode we speak to Floor Jansen, team leader of the offender prevention squad of the Dutch police, and British offender prevention expert Gregory Francis about young cybercrime offenders. We discuss their sometimes surprising motivations, wh…
New survey data shows a troubling disconnect between security professionals’ confidence and their track record in beating ransomware. What gives? Key Points: Overoptimism is not a security professional’s friend. Yet new research finds th…
Research from Mimecast Threat Center reveals a malware campaign delivered via sideloading, a new technique enabled by Windows 10, known to result in ransomware attacks. Key Points: A threat actor known for spreading malware such as Trickbot a…
Ransomware attacks are increasing due to low-cost tools and vulnerable targets, with high chances of profits and minimal risk. Key Points: Ransomware attacks are on the rise thanks to wide availabilit…
Mimecast Threat Center discovered a weak…
Read More >
Mimecast Threat Center discovered a weakness in the Microsof… Read More >
Since the dawn of social engineering, at…
Read More >
Since the dawn of social engineering, attack methodology has… Read More >
With Cybersecurity Awareness Month here,…
Read More >
With Cybersecurity Awareness Month here, we’re ready t… Read More >
Get posts like this delivered to…
Read More >
Get posts like this delivered to your inbox. Subscri… Read More >