The past few years, the major studios and production companies that create movies, broadcast television, streaming content, and even online and video games have been under cyber attack.
The past few years, the major studios and production companies that create movies, broadcast television, streaming content, and even online and video games have been under cyber attack.
Tags: malware, isolation, ransomware, malicious code, cyber attacks, phishing attack
It seems that almost daily, there is a new story about another bank or financial services institution (FSI) falling victim to a phishing or other cyberattack.
Tags: malware, isolation, malicious code, anti-phishing, cyberattacks, CISO, multi-factor authentication, Trickbot banking Trojan, Trojans, remote browers
This is intended to be a little tongue in cheek for readers, however it’s been written to provoke discussion on how organizations continue to do the same things they have done for the last 15 years without thinking.
Tags: malware, cybersecurity, isolation, security, ransomware, malicious code, security strategy, anti-phishing, phishing prevention, spear-phishing
In medical terms, Patient Zero is loosely defined as the first human infected by a new or recently discovered viral or bacterial outbreak. The term has found its way into the IT security lexicon where its corollary is the first individual to be infected by a new malware strain, or the first victim in a phishing campaign.
Tags: malware, cybersecurity, blog, phishing, isolation, security, malicious code, anti-phishing, phishing prevention
A new and rapid growth trend during the U.S. political season is that various treasure troves of leaked documents now await the masses on the Internet, including via sites like WikiLeaks and "Guccifer 2.0’s” latest Wordpress blog.
Tags: malware, cybersecurity, phishing, isolation, pdf, security, ransomware, risk, malicious code, malware vulnerabilities, cyber theft, security strategy, email attachments