• Topics
    • Advanced IT analytics
    • General
    • Unified service management
    • Identity and access management
    • IT operations management and observability
    • Security Information and Event Management
    • Unified endpoint management and security

Home / Tags:malware

Bumblebee Malware is back with evolving tactics: How EventLog Analyzer can help protect your organization

Log360 | December 18, 2024

Bumblebee Malware is back with evolving tactics: How EventLog Analyzer can help protect your organization

In a surprising development, Bumblebee Malware (a popular malware downloader) has...

General | December 26, 2023

Ataques ransomware: o que são e como podem ser evitados

No primeiro semestre de 2023, 48 grupos de ransomware fizeram mais de 2.200 vítimas no...

RecoveryManager Plus | March 10, 2023

World Backup Day: Why having a plan B is important for every organization

In today's data-driven economy, data is the lifeblood of any business. A catastrophic data...

The recovery: How to overcome a malware attack

General | October 27, 2022

The recovery: How to overcome a malware attack

A report published by Cybersecurity Ventures predicts that by 2031, ransomware will...

CISA's recommendations to recognize and avoid email scams [E-book]

Exchange Reporter Plus | November 30, 2020

CISA's recommendations to recognize and avoid email scams [E-book]

Email has always been a popular tool for business communications. Unfortunately, it is...

Security Information and Event Management | September 15, 2020

Are you listening to your logs? Part 3: High disk usage

In the previous blog of this series, we saw how server crashes can be avoided by detecting...

3 simple ways to ensure email security in the post-COVID-19 era [E-book]

Exchange Reporter Plus | July 8, 2020

3 simple ways to ensure email security in the post-COVID-19 era [E-book]

Due to social distancing mandates following the COVID-19 crisis, organizations around the...

Five worthy reads: Fend off cyberattacks using dark web intelligence

General | June 7, 2019

Five worthy reads: Fend off cyberattacks using dark web intelligence

Five worthy reads is a regular column on five noteworthy items we’ve discovered while...

How to avoid getting tricked by hackers this Halloween

General | October 29, 2018

How to avoid getting tricked by hackers this Halloween

While everyone prepares for the frights of Halloween, there's a real evil lurking just...

Python-based adware threatens browser security

Endpoint Central | July 2, 2018

Python-based adware threatens browser security

Security researchers at Kaspersky have identified a new variant of Python-based adware,...

Zacinlo: Adware for Windows 10 with a spyware twist

Endpoint Central | June 27, 2018

Zacinlo: Adware for Windows 10 with a spyware twist

A recent resurgence of an adware strain has begun targeting systems running on Windows 10...

Identity and access management | January 18, 2018

The Microsoft Meltdown-Spectre patches…the real story

Microsoft has released patches for the Meltdown and Spectre CPU vulnerabilities, but you...

Page 1 of 212»Last »