A phishing campaign used a “broken” file attachment to help its malware payload evade detection by both automated and manual analysis tools.
Read moreThis article originally appeared on the AppRiver blog.
Read moreAppRiver Adds Encryption Software to Channel Lineup
An attack campaign is using both the Emotet and TrickBot trojan families to infect unsuspecting users with Ryuk ransomware.
Read moreThis article was originally published on the AppRiver blog.
Read moreEvery year, the U.S. Internal Revenue Service (IRS) releases its “Dirty Dozen” list. This compilation covers some of the most common types of scams that target taxpayers each tax season.
Read moreTwo ongoing phishing campaigns are leveraging Microsoft’s Azure Blob Storage in order to steal users’ Outlook and Microsoft account credentials.
Read moreManaging the complex regulatory compliance landscape facing healthcare organizations can be a burden on the budgets and productivity of security teams.
Read moreNowadays, digital attacks are a serious concern for organizations. One need only look to the growing costs of digital crime to understand why.
Read moreMachine Learning and Artificial Intelligence are Everywhere If you attended the RSA conference, or any other recent security conference, you’ve probably noticed that many vendors pitch machine learning and artificial intelligence as the latest and greatest ways to defen
Read more