Documents with embedded macros are increasingly being used to deliver malware. New Microsoft defaults decrease the danger, but only somewhat, and only for Office docs.
To its credit, Ireland’s Health Service Executive (HSE) had PWC conduct an independent review of the ransomware attack on its systems. Even more to its credit, it has shared the report. Here’s what we learned.
Ambitious cybercriminals constantly introduce new exploits and manipulative techniques to keep phishing effective. These new ones are particularly dangerous.
Within hours of the Log4j vulnerability (CVE-2021-44228) being published, Ericom's ZTEdge platform had an automatic security update applied to protect our customers.
If your law firm holds confidential, high value client data and operates on tight, un-missable deadlines, watch out. Hackers have your firm in their crosshairs.
HTML smuggling attacks are on the rise and unfortunately are able to evade traditional cyber defenses. Learn what these attacks are, and what you can do about them