Securing the managed service provider (MSP) - Managed service providers (MSPs) have become the target of attacks, as lack of aggressive security posturing has left them—and the high-value data of their clients—vulnerable. Learn how MSPs can secure against a rising tide of threats.
Cyber insurance: here to stay, whether we like it or not - We take a look at the many reasons people and businesses make use of cyber insurance, and ask if it's as bad as (some) make it out to be.
How to protect against stalkerware, a murky but dangerous mobile threat - Stalkerware has capabilities as dangerous as nation-state malware, but is often marketed as legitimate. So how do you protect against stalkerware when it's not always clear it's a threat?
Explained: war shipping - War shipping is a tactic already in use by Red teams, and is a growing opportunity for cybercriminals to compromise business networks. Learn how war shipping works and how to protect your organization from it.
A week in security (September 30 – October 6) - A roundup of the latest cybersecurity news for the week of September 30 – October 6, including National Cybersecurity Awareness Month, Magecart, and more.
Magecart Group 4: A link with Cobalt Group? - Malwarebytes threat intel partnered with security firm HYAS to connect the dots between Magecart Group 4 and the advanced threat group Cobalt.
Explained: how security orchestration improves protection and response - Security orchestration is a regulator that makes sure security solutions, often from different vendors, work well together to automate response and keep organizations safe.
For Cybersecurity and Domestic Violence Awareness months, we pledge to fight stalkerware - It's time for the cybersecurity community to fight stalkerware with all they've got. For National Cybersecurity Awareness and Domestic Violence Awareness months, we renew our pledge.
A week in security (September 23 – 29) - A roundup of the security news from September 23–29 including Emotet, checkm8, securing webcams, insurance data,  Nodersok, voting machines, iHandy, CCleaner, encryption and breaches.

Select your language