Fake Zoom Downloader is the Latest Method of Attack on Remote Workers

Fake Zoom Downloader is the Latest Method of Attack on Remote Workers

Riding on the coattails of the massive rise in popularity in the video conference solution, remote workers new to Zoom need to be wary of where they download the installer. We’ve written... Read more »
Emotet Malware Shows Up in SMiShing Attacks Disguised as Bank Notifications

Emotet Malware Shows Up in SMiShing Attacks Disguised as Bank Notifications

A newly discovered attack looks to try to make a victim of mobile device holders using a two-pronged attack that uses Emotet and, perhaps, Trickbot. Security researchers at IBM X-Force have uncovered... Read more »

Five worthy reads: Fend off cyberattacks using dark web intelligence

One of the greatest advantages of the dark web is the anonymity and encryption it offers while allowing users to access everything on the world wide web. This also makes it the... Read more »

Next Generation Firewalls May Not Stop Malware

Best Defense Against Malicious Encrypted Traffic Bad actors and malicious insiders are concealing threats in encrypted traffic in an attempt to steal sensitive data. In fact, it is predicted that as much... Read more »