Research

This is a archive for Research.

New Trojan Uses Legit Certificate

A previously unknown Trojan appears to be related to the Chinese-speaking threat actor, LuckyMouse, researchers said. An unusual trait of
Read More.

How to Defend Electric Grid in U.S.

With more adversaries seeking to attack the U.S. power grid, the country now has an opportunity to help deter bad
Read More.

ICS Attacks Continue to Rise: Report

In the manufacturing sector, 41.2 percent of industrial control systems (ICS) computers were attacked by malicious software at least once.
Read More.

Machine Identities Not Secure: Report

Ninety-six percent of companies believe that effective protection of machine and human identities are equally important to the long-term security
Read More.

Botnet Report: Multifunctional Malware Growing

Multifunctional malware not designed for specific purposes, but flexible enough to perform almost any task, is becoming more widespread, a
Read More.

Email Impersonation Attacks Skyrocket

There is a huge volume of email threats that go undetected by the incumbent technologies, a new report found. In
Read More.

Email Impersonation Attacks on Rise

Securing email continues to get more difficult as companies believe data breaches occurred because of attackers impersonating email. While companies
Read More.

Compliance Violation Witnesses Looking to Leave

A majority of workers that witnessed a compliance violation are actively looking for new positions, a new survey found. Twenty-nine
Read More.

IT Infrastructure Struggle for SMBs: Report

IT infrastructures continue to present a problem for small to medium-sized businesses, a new report found. Two-thirds (66 percent) of
Read More.

Industrial Firms Hit by Spear Phishing

A wave of financial spear-phishing emails disguised as legitimate procurement and accounting letters hit over 400 industrial organizations located mostly
Read More.

 
 
Archived Entries