Business Email Security Contributes to Business Stability

Since the invention of email, the communication of many companies has relied on it. In time, business email security became vulnerable to a variety of issues that you need to be…

Threat Actors Use Telegram to Spread ‘Eternity’ Malware-as-a-Service

An account promoting the project—which offers a range of threat activity from info-stealing to crypto-mining to ransomware as individual modules—has more than 500 subscribers. Cybercriminals are promoting a new, modular…

Cybercriminals Launch a New Malware-as-a-Service: the ‘Eternity Project’

The ‘Eternity Project,’ a new malware-as-a-service, allows cybercriminals to buy a malware toolkit that can be “personalized” with various modules depending on the type of cyberattack being carried out. According…

EMEAR Monthly Talos Update: Wiper malware

Cisco Talos and Cisco Secure are launching a new video series to fill you in on the latest cybersecurity trends. We’re thrilled to launch our first video in the new…

Delete data! Here's the safest way to permanently erase your laptop's drive [Ask ZDNet]

 On modern systems with solid-state drives, you can often find a management utility that includes a Secure Erase command. Getty Images Welcome to this week’s installment of Ask ZDNet, where…

What's the safest way to permanently erase your laptop's drive? [Ask ZDNet]

 On modern systems with solid-state drives, you can often find a management utility that includes a Secure Erase command. Getty Images Welcome to this week’s installment of Ask ZDNet, where…

BPFdoor Has the Capacity to Bypass Firewalls

A new Linux malware dubbed BPFdoor has been recently identified. Its targets have been Linux and Solaris systems and what’s more, is that it has passed unnoticed for over 5…

WordPress Websites Files and Databases Injected with Malicious JavaScript

WordPress is a content management system (CMS) that is free to use and open-source. It is built in PHP, and it can be combined with either a MySQL or MariaDB…

#CYBERUK22: Cyber Trends from the Russia-Ukraine War

A panel of cyber leaders discuss Ukraine’s cyber-resilience and other trends during the conflict

Just in time? Bosses are finally waking up to the cybersecurity threat

Boardrooms have a reputation for not paying much attention to cybersecurity, but it could be that executives are finally keen to take more interest in securing the systems and networks…