August 13, 2018 - Process doppleganging, a rare technique of impersonating a process, was discovered last year, but hasn't been seen much in the wild since. It was an interesting surprise, then, to discover its use mixed in with Process Hollowing, yet another technique, in a dropper for the Osiris banking Trojan.
August 10, 2018 - Ransomware distributors have started using RDP to gain access to business networks. Do you have your remote desktops under control?
August 9, 2018 - The security vulnerabilities of the latest developments in tech have been well documented. But what about everyday technologies that have been around for a while or are widely adopted? Here are eight commonly-used tech conveniences that are not as ironclad as you might hope.
August 7, 2018 - Just like the beach, the EK landscape got a little crowded this summer. Find out what we discovered in our exploit kits summer review.
August 6, 2018 - A roundup of the security news from July 30 – August 5, including cryptomining, big data, social engineering, and more.
August 3, 2018 - In our explained series, we talk about the impact of big data on our society. What is it, who uses it, and for what purposes?
August 2, 2018 - Cybercriminals will do what it takes to get what they want, whether that's breaching a corporate network or stealing credentials with malware. But what do we do if hackers are hacking us instead of our computers? Here's how to tell if you're susceptible to social engineering attacks, and what to do to combat them.
July 31, 2018 - We take a look at a few of the most notable spam emails in circulation over the last week, including a money muling scam, Apple phishes, and a sexploitation message featuring old, but real, passwords.