Results for "Salesforce"
September 8, 2014 - The threat known as Dyre was originally spotted by security firm CSIS and by PhishMe which also had uncovered the new malware earlier in June. Back then, the threat was aimed at banks and other financial institutions, something very reminiscent of other banking Trojans such as Zeus and its variants. But researchers discovered that the malware is now capable of capturing login credentials from Salesforce users by redirecting them through a phishing website. Dyre will initially infect users through some form of social-engineering, typically with an email that contains a malicious attachment. Once on the system, the malware can act as a man-in-the-middle and intercept every single keystroke. To be clear, this is not a vulnerability with Salesforce or its website, but rather a type of malware that leverages compromised end-point machines.
June 11, 2021 - Many US organizations are migrating from in-house, on-premises solutions to the Cloud. We look at what's driving the Cloud's ascendency.
April 21, 2020 - The effectiveness of passwords to protect data has long been debated. Many have called for the death of passwords, instead pushing for biometrics to secure their most precious information. But is biometrics really a better, safer option?
December 4, 2019 - Cybercriminals are abusing platform-as-a-service (PaaS) cloud provider Heroku to build web skimming apps and steal customer data.
August 27, 2019 - We look at recent research exploring the threat of clickjacking, along with other solutions considered by site owners and analysts for protecting users against these online attacks.
September 12, 2018 - There's a new kind of fraud out there, and it's after organizations that have embraced omnichannel, a strategy that focuses on improved user experience. We take a look at what omnichannel is, the kinds of fraud that can affect businesses using this approach, and how they can protect themselves—and their clients.
March 28, 2018 - QuantLoader is a Trojan downloader that has been used in campaigns serving a range of malware, including ransomware, Banking Trojans, and RATs. In this post, we'll take a high-level look at the campaign flow, as well as a deep dive into how the malware executes.
August 14, 2017 - A compilation of security news and blog posts from Monday the 7th of August to August 14th. We looked at security certificates and the new bloated Cerber ransomware.
March 7, 2016 - A compilation of notable security news and blog posts from February 28 to March 5.