Reading Time: 3 minutes
In a rather new trend, cybercriminals have begun to spread malware by spoofing printers and scanners.
These types of attacks started...
Reading Time: 5 minutesIn the first few weeks of 2018, cybercriminals targeted five universities, 23 private companies and several government organizations. Despite the...
Reading Time: 2 minutes
Globally, on Monday, November 27th… Cyber-Monday… the Lab saw a massive spike in detections. The reason? Cyber Monday deals lead...
Reading Time: 2 minutes
A new research note profiling the unique auto-containment + Cloud analysis approach to endpoint protection in Advanced Endpoint Protection was...
Reading Time: 3 minutes
Melih took on the giants of the PKI certificate business and bested them, by creating the world’s leading certificate authority.
Now...
Reading Time: 2 minutesEvery cybersecurity responsible person knows the power of paranoia. Assume nothing, test everything, and then do it again.
Here are three...
Reading Time: 5 minutesUPDATE AND CORRECTION: Konica Minolta C224e is not sending you dangerous phishing emails. Malicious hackers have created an email and file...
Reading Time: 2 minutesIndustry Analysts and “Experts” are sometimes wrong. Sometimes very wrong. Like with a weather man I heavily discount their predictions,...