Category: EN

How to Analyze Malware in 5 Steps

Trojans, ransomware, spyware, and other types of malware are significant threats to organizations. To stay informed and understand how the latest malware operates, cybersecurity professionals need to be able to analyze it. Here are five steps that security specialists can…

Hand me the flashlight. I’ll be right back…

< div class=”field field–name-body field–type-text-with-summary field–label-hidden”> < div class=”field__items”> < div class=”field__item even”> It’s time for the second installment of campfire tales from our friends, The Encryptids—the rarely-seen enigmas who’ve become folk legends. They’re helping us celebrate EFF’s summer membership…

256,000+ Publicly Exposed Windows Servers Vulnerable to MSMQ RCE Flaw

Cybersecurity watchdog Shadowserver has identified 256,000+ publicly exposed servers vulnerable to a critical Remote Code Execution (RCE) flaw in Microsoft Message Queuing (MSMQ) services. The flaw, designated CVE-2024-30080, poses a significant threat to global cybersecurity. It could allow malicious actors…

Time to zero in on Zero Trust?

Recently discovered vulnerabilities in VPN services should push ASEAN organizations to rethink their perimeter security approach Sponsored Post  Companies the ASEAN region have long relied on a virtual private network (VPN) to help encrypt their Internet traffic and protect users’…

GenAI keeps cybersecurity pros on high alert

“Businesses across every industry face unprecedented challenges posed by an increasing attack surface, zero-day vulnerabilities, cloud misconfigurations, and new emerging threats driven by AI,” said Andrei Florescu, president and GM of Bitdefender Business Solutions Group. “The findings of our recent…