In the first edition of SecurityRoundtable.org magazine, get the latest ideas and best practices to secure the cloud from industry experts and business executives. Your journey to the cloud starts here.
Complexity has infiltrated every aspect of cybersecurity, resulting in costly and ballooning IT infrastructure. In the second edition of SecurityRoundtable.org magazine, experts like Rick Howard, Naveen Zutshi, and Mario Chiock provide ideas on how to simplify operations to achieve more efficiency and success.
As web-based attacks become more automated and effective, organizations must go beyond web protection basics. URL Filtering enables defenders to take advanced security actions to protect against malicious sites that deliver malware or steal credentials. Read this infographic for four advanced URL Filtering capabilities you can take use to enable safe web access and why they matter.
actors have been attributed to more than 51,000 malware samples and 1.1 million cyber attacks over the last four years as they are gaining experience quickly as they adopt new technologies, techniques, and malware to advance their schemes, according to a May 9 blog post.
SilverTerrier is not a traditional cybercrime group. It is the collective name Unit 42 of Palo Alto Networks gives to Nigerian cybercriminals. SilverTerrier continues to grow (over 400 individual actors) and evolve (from advance fee and 419 scams to business email compromise (BEC) and malware distribution).
Despite a doxing of its targets and tools in March, the advanced persistent threat group known as OilRig remains a significant threat to governments and businesses, researchers at Palo Alto Network's Unit 42 report.
Attackers are actively exploiting recently fixed vulnerabilities in Oracle WebLogic and the Widget Connector macro in Atlassian Confluence to deliver ransomware, mine cryptocurrency and make the compromised machines participate in DDoS attacks.