TECHNOLOGY > Forensics
TECHNOLOGY > Forensics Category Archive« Back to News
DNSMessenger: Researchers at the Talos threat research group have published a report on a new form of malware that’s very difficult to detect.
Threat analysts need a more robust framework for characterizing suspicious activity on their endpoints and networks. By Jane Ginn
Fileless malware avoids detection by hiding its payload in secluded spots, like a computer’s RAM or kernel, independent of hard drive files to run on.
There are concrete strategies & commercial tools available to use to protect yourself against ransomware attacks. By Dinesh Kumar Aggarwal
An Iran-linked advanced persistent threat (APT) group has used fake University of Oxford websites to deliver malware to victims.
The cost of not taking cyber security seriously today is just like the cost of not having your business properly insured.
Most workers put convenience ahead of security policies, with 90% of them admitting to ignoring them when they feel they need to.
Increasingly sophisticated techniques deployed by attackers using DDOS methods are making the reported size of such attacks redundant.
Threat intelligence is a new technique that helps security organisations recognise attack indicators and target their response fast & accurately.