-
EIZO FlexScan S1734: Classic 17-inch Square Monitor Gets a Modern Upgrade (Post)
EIZO Corporation has just announced the release of the FlexScan S1734, a refreshed 17-inch square monitor designed specifically for back offices, control rooms, and other professional environments wh ...
-
BenQ Launches MA270S: A 5K Glossy Monitor Built for Mac Users (Post)
BenQ has introduced the BenQ MA270S, a new 27-inch 5K monitor designed specifically for Mac users. The display expands BenQ’s Mac-focused MA series and aims to deliver the same clarity, color a ...
-
Improvements of CloudGuard IaaS in the latest release of R80.40 Unified Security (Post)
Earlier this year, Check Point released the latest version of Unified Security, R80.40, which brings major improvements to CloudGuard IaaS.R80.40 helps improve the efficiency of cloud security engine ...
-
Password managers can make your network more secure – but mind the gaps (Post)
It seems odd to imagine that one piece of software, which doesn’t even require a network connection, can improve the safety of your online life. But password managers certainly appear to fall into ...
-
July‘s Most Wanted Malware: Emotet Strikes Again After Five-Month Absence (Post)
Since February 2020, Emotet’s activities, primarily sending waves of malspam campaigns started to slow down and eventually stopped, until re-emerging in July. This pattern was observed in 2019 when t ...
-
Facing down the myriad threats tied to COVID-19 (Post)
Unscrupulous marketers and cyber-criminals have seized upon concerns over the emergence of the COVID-19 global pandemic as bait for spam, phishing attacks and malware. In recent weeks, the use of “co ...
-
Microsoft 365 Phishing Attacks Masterfully Use Brand Name Sites to Establish Legitimacy (Post)
New voicemail phishing scam uses legitimate branded domains from companies like Samsung and Adobe to facilitate redirects to compromised websites intent on stealing credentials.It’s an age-old campai ...
-
July 2023’s Most Wanted Malware: Remote Access Trojan (RAT) Remcos Climbs to Third Place while Mobile Malware Anubis Returns to Top Spot (Post)
Check Point Research reported that RAT Remcos rose four places due to trojanized installers, Anubis Mobile Malware Ousted SpinOk and Education/Research Still Hardest HitOur latest Global Threat Index ...
-
Automated attacks on web applications (Post)
Cybercrime has become big business, and scammers are increasingly turning to bots and automation to make their attacks more efficient and effective and help them avoid detection.In December, Bar ...
-
Securing Telecommuters with Expanded Endpoint Visibility and Control (Post)
If there is one thing that the ongoing pandemic has taught us, it’s that telecommuting could become the new normal. But IT executives must tread carefully, because expanding the bounds of the enterpr ...
-
Secure your Custom Applications with Forcepoint DLP App Data Security API (Post)
Easily integrate true data security into your organization’s in-house software Did you know that a majority of software applications (some estimates upward of 62% of all enterprise software applicati ...
-
Cybersecurity and Infrastructure Security Agency Warn of New VBA Attack Designed to Deploy KONNI Remote Administration Tool (Post)
A new alert from CISA outlines just how dangerous and intrusive the KONNI malware is in organizations that fall for phishing attacks using Word attachments with malicious VBA code.The latest warning ...