Latest Threat Intelligence Articles
Hijacked from Within: The Ransomware Insider Threat
Last June, a major ransomware operator launched a new version of its ransomware-as-a-service offering with an alarming twist. It had updated the Windows wallpaper placed on encrypted devices to display an offer to “earn millions of dollars” for providing the cybercrime gang with network access or other insider information that would help it “steal the most valuable data of any company.”  ...
What Is a Botnet?
Bots are everywhere these days; they handle a lot of the grunt work of the digital world. For instance, many companies use chatbots to handle simple customer service requests. But bots have a malicious side as well: Botnets. These are networks of computers infected with malware that allows fraudsters to use them for their dirty work. And botnet attacks are on the rise. In the U.S. ecommerce secto...
Malware Types and How to Detect Them
Malware preys on so many facets of modern life and times, from remote work to back-to-school shopping to geopolitical relations. And it continues to spread. By one account, attempted cyberattacks using malware increased 11% in the first half of 2022 compared to the same time last year.  As its name implies, malware is the evil twin of legitimate software, slipping into networks posing as harm...
Get the latest threat intelligence information and resources from our Threat Center researchers who provide technical analysis of cyberattack campaigns, evolving threat landscapes as well as recommendations to help guide your cybersecurity practice.
More Threat Intelligence Insights
Unfortunately we don't have any results matching your criteria, but you can try changing the selected filters above.
Related Threat Intelligence Resources
Subscribe to Cyber Resilience Insights for more articles like these
Get all the latest news and cybersecurity industry analysis delivered right to your inbox
Sign up successful
Thank you for signing up to receive updates from our blog
We will be in touch!