Enterprise incident response: getting ahead of the wave

As with traditional warfare, beating back attacks and winning depends on having a plan. Here are several incident respond models security researchers have developed for responding to threats.

Read more

Are hackers gonna hack anymore? Not if we keep reusing passwords

A look at the not-so-hacking hacker techniques attackers are using to compromise user accounts via weak passwords and gain access to enterprise networks.

Read more

Phishes, pseudophishes, and bad email

Everyone knows about phishing. But what about pseudophishing? When companies use poor design, no attribution, and broad requests for personal info, their legit emails look like a phish.

Read more

OWASP top ten – Boring security that pays off

OWASP recently published a draft list of the top 10 security vulnerabilities of 2017. While intended for developers seeking to code more secure applications, the top 10 list is based on actual survey data of threats seen in the wild and serves as a great starting point for organizations struggling with security priorities. Let’s take a look and see how long they’ve been around prior to publication.

Read more

New Mac OS X remediation offering and forensics capabilities for enterprise

At Malwarebytes, our mission is to protect consumers and businesses from the most dangerous cyber threats. Today, we announced a new solution that will dramatically change endpoint detection and response (EDR) for Mac users – a growing target area for hackers. The fact that Mac users are safe from cyber threats is a common misconception.

Read more

Select your language