The Most Recent Trends in Malware Roundup
Every day a new development unfolds in the battle between cybersecurity and malware. Here are some of the most recent trends in malware threats you should know about.
Every day a new development unfolds in the battle between cybersecurity and malware. Here are some of the most recent trends in malware threats you should know about.
There have always been two sides to the story: either you passionately believe in phishing awareness training, or you think it is a complete waste of company resources. While it can be difficult to see the other side of the argument, the truth is there is no hard statistical evidence to strongly support security awareness…
Votiro was recently quoted in a Consumer Reports article on the rising cyber threats facing iPhones and Macs. Apple operating systems were long considered to be less vulnerable to malware than their competitors, but new threats have been on the rise. As several vulnerabilities have recently been discovered, and subsequent patches have been released, hackers…
Thales TCT is a trusted provider of cybersecurity solutions for US federal defense, intelligence, and civilian agencies. In April 2020, TCT partnered with Votiro to bring the benefits of our Positive Selection technology and file-based security to the US government. In a recent webinar, Kirk Spring, Trusted Cyber Security Advisor at TCT, and Richard Hosgood,…
It seems like every day a news headline announces another company experiencing a ransomware attack. As ransomware becomes more pervasive, it also becomes more destructive, leading to business interruption that impacts customers and supply chains. By understanding how ransomware manages to evade detection, organizations can move towards the only cure for ransomware: prevention. Understanding the…
Today’s plethora of security vulnerabilities within enterprises’ networks – coupled with the ease of luring employees into engaging with spear-phishing emails, – are primary reasons why ransomware attacks have rapidly increased. One recent attack against a food and drink manufacturer led security experts to conduct a thorough examination of their network and analyze how the…
With more staff working from home than ever before, enterprises have faced unprecedented risks in securing employees’ home offices and personal devices. This blog explores the multiple weak spots in file security strategies that exist with this model, both due to human error and to technological gaps. We will also introduce the security technology, content…
Throughout the week of May 10, 2021, headlines thrived on the havoc a ransomware attack against Colonial Pipelines wrought across the United States. As people rushed to gas stations, some filling plastic bags with gasoline, the federal government declared a state of emergency. As ransomware continues to plague public and private organizations, taking a deep…
Ransomware continues to plague companies as the remote and hybrid workforce models leave new attack vectors. Research notes a 715% year-over-year increase in ransomware during 2020. Now that most disaster recovery and business continuity plans include robust data backup strategies, cyber attackers use a combined ransomware approach that both encrypts data and steals data. The…