Search
Close this search box.

Blog

Enterprise Analytics: Searching, Clustering, and Learning – Oh My!

Enterprise Analytics: Searching, Clustering, and Learning – Oh My! Have you ever put together a 1,000-piece puzzle without a picture to reference as you work? The task is time-consuming, frustrating, and seemingly impossible. After turning over each piece, you slowly begin to notice how the disparate shapes and images can

Read More >

Fake Invoice Carries “Rescoms” Malware

Emails containing malicious attachments equipped with keyloggers and screen capture capabilities are targeting businesses worldwide, with noted attacks in Asia, Russia, and the Middle East. The campaign is designed to look like it comes from real affiliates and employees working for a well-known pharmaceutical distributor in order to make the

Read More >

Stealing Tax Refunds Soaring Worldwide

There appear to be only two things that are certain in life: death and cybercriminals trying to steal your tax refund. As governments have moved tax systems online to facilitate life for the taxpayer, refund scams using phishing and social engineering to obtain personal financial information have become epidemic, with

Read More >

Classification and GDPR Compliance – Why?

The Requirement for Classification as part of GDPR Compliance Data privacy in the scope of the GDPR requires a clear understanding of the data you retain. What type of data is being stored, where it is being stored, and who is accessing it are the guiding principles, and classification of this data

Read More >

Locky Revived – A Roundup of New Variants

Locky, the ransomware which dominated 2016 and then disappeared for the first half of 2017, has been completely rescuscitated during the past three months with a series of new variants, and demanding three times the ransom rate. A possible reason for its disappearance and reemergence was explored in a recent

Read More >

Locky wiederbelebt – eine Zusammenfassung der neuen Varianten

Locky, die Ransomware, welche 2016 dominiert hat und dann in der ersten Jahreshälfte von 2017 verschwunden ist, wurde mit einer Reihe neuer Varianten in den vergangenen drei Monaten zu neuem Leben erweckt und fordert jetzt das Dreifache des Lösegelds. Ein möglicher Grund für sein Verschwinden und Wiederauftreten wurde im aktuellen

Read More >

Bad Rabbit Ransomware is Rebuilt NotPetya

The current “Bad Rabbit” ransomware outbreak has been generating quite a bit of news, with some conflicting accounts of its origin. Clarifying here that Bad Rabbit is a variant of the widely reported “NotPetya” ransomware, which we covered in a blog earlier this year. Bad Rabbit leverages one of the

Read More >

How to Identify & Spot Phishing Links

Phishing links are harmful or misleading links that are disguised in an attempt to make them look safe and normal. These links usually lead to a fake website and entice you to enter sensitive information. Other links can also contain malware, which could give cybercriminals access to all your stored

Read More >