Category: Vendors
New Variant of Ploutus ATM Malware Observed in the Wild in Latin America
Introduction Ploutus is one of the most advanced ATM malware families we’ve seen in the last few years. Discovered for the first time in Mexico back in 2013, Ploutus enabled […]Remote Work Enablement and Securing the Insider Threat
Editor’s Note: As part of our content series on cybersecurity best practices for remote work enablement, the following is a guest post from Matthew P. Miller, Principal, Cyber Security Services […]Ivanti on Ivanti: Smooth Transition to Work From Home With Ivanti Cloud
In building out a contingency plan during the outbreak of the COVID-19 pandemic, roughly 400 of our Ivanti employees in the South Jordan, Utah location near Salt Lake City transitioned […]What’s new in OpenText InfoArchive Cloud Edition (CE) 20.2?
Over the last several releases, OpenText™ has invested heavily in advancing InfoArchive as the modern information archiving platform for long-term compliance of critical enterprise and customer data. In each of […]Limited Shifts in the Cyber Threat Landscape Driven by COVID-19
Though COVID-19 has had enormous effects on our society and economy, its effects on the cyber threat landscape remain limited. For the most part, the same actors we have always […]Feed does not exists
Feed does not exists. It was deleted a long time ago. Or never existed at all.Micro Focus: a solution to the skills issue
IBM Mainframe COBOL, enterprise-class, core application environments are often the lifeblood of an organisation. Whether commercial or government, revenue… View Article (Feed generated with FetchRSS)Risk Analysis Example: How to Evaluate Risks
Organizations are struggling with risks on multiple fronts, including cybersecurity, liability, investment and more. Risk analysis, or risk assessment, is the first step in the risk management process. IT risk […]TAU Threat Analysis: NetWire Variant Leveraging AutoIt Scripts and Windows Shortcut Links
NetWire, an information stealing RAT that dates back multiple years, has been witnessed in the wild recently using a tactic of combining Windows shortcut link files and AutoIt scripts. These […]CVE Vulnerability Scanning for Containers
At McAfee, our job is to help secure the workloads and data that our customers rely on to power their business. This release of MVISION Cloud for Containers is about […]Load More