The Dangers of Drive-By Download Attack Drive-by-downloads are harmful pieces of software that are downloaded to an endpoint device as a result of visiting a compromised web page or an HTML-based email that links to a website. This attack occurs without the consent or knowledge of the user. Users mainly become a victim to the […]

Read More →

The Great Perils of FPhishing Every year, many organizations fall victim to phishing attacks. Tens of millions of phishing emails make it to your inbox and are clicked and opened. A recent study by the Anti-Phishing Working Group (APWG) has revealed just how much we have been victim to phishing over the years. The study […]

Read More →

Today’s sophisticated and complex malware targets all industries, and healthcare industry is becoming a popular choice amongst attackers. Healthcare organizations should have another look at their cyber security structure around endpoint devices like laptops, tablets, desktops, smartphones, patient control and monitoring devices. A recent survey on healthcare security with respondents comprising healthcare organizations stated that […]

Read More →

Advanced Persistent Threat (APT) is a network attack in which an attacker chooses a particular target, uses social engineering and advanced technologies to break into a network. Until the attack is successfully executed, they focus on that particular target for weeks, months, and years. Once inside a network, the objective of the attacker is to lay […]

Read More →

Patch fatigue is a term that’s buzzing amongst IT managers due to the devastating number of patches enterprises need to keep their environment safe and updated. 2016 IBM Security Report covered 18 years of patches with over 100,000 known vulnerabilities. Though only a few of these vulnerabilities affect each device in a network at any […]

Read More →