Ericom is seeing strong global demand for its portfolio of secure web and application access products across all sectors. CEO David Canellos shares his perspective on Ericom's 2021, and what's next in 2022.
Ambitious cybercriminals constantly introduce new exploits and manipulative techniques to keep phishing effective. These new ones are particularly dangerous.
Update - Ericom software products and the Log4Shell Exploit – CVE-2021-44228
Within hours of the Log4j vulnerability (CVE-2021-44228) being published, Ericom's ZTEdge platform had an automatic security update applied to protect our customers.
If your law firm holds confidential, high value client data and operates on tight, un-missable deadlines, watch out. Hackers have your firm in their crosshairs.
In this second post covering the 2021 IOCTA report, we discuss the increasing use of cloud-based “crime as a service” platforms and the convergence between plain old criminals and the cyber variety.
The new IOCTA report describe how today’s cybercriminals have adopted increasingly strategic approaches to who they attack and how they do it – and are securing larger payouts as a result.
HTML smuggling attacks are on the rise and unfortunately are able to evade traditional cyber defenses. Learn what these attacks are, and what you can do about them