Ransomware distributors have started using RDP to gain access to business networks. Do you have your remote desktops under control?
Cybercriminals will do what it takes to get what they want, whether that’s breaching a corporate network or stealing credentials with malware. But what do we do if hackers are hacking us instead of our computers? Here’s how to tell if you’re susceptible to social engineering attacks, and what to do to combat them.
The last quarter is likely the last hurrah of the campaigns and attacks we’ve been seeing over the last 6 months. What comes next may completely change the game. Check out our latest Cybercrime Tactics & Techniques report to find out more about what you may encounter next quarter.
SamSam ransomware is a unique malware for its explicit human interaction on selected targets and care to erase most of its tracks.