A cyberattack is not the same thing as malware—in fact, malware itself is typically the last stage of an attack, the…
Tag: threat hunting
Are our police forces equipped to deal with modern cybercrimes?
“You should have asked for the presence of a digital detective,” Karen said when I told her what happened at the…
5 tips for building an effective security operations center (SOC)
Security is more than just tools and processes. It is also the people that develop and operate security systems. Creating systems…
Solution Corner: Malwarebytes Incident Response
Unless you’ve been stuck at a fiery music festival, I don’t need to tell you the threat landscape is constantly evolving…