The general public deserves less hyperbole and more straight talk I must admit that I’ve grown increasingly weary over the...
Month: May 2015
Many of today’s industrial control systems (ICS) are considered to be antiquated, making them vulnerable to a cyberattack, especially if...
In recent weeks, Unit 42 has been analyzing delivery documents used in spear-phishing attacks that drop a custom downloader used...
Over the last few years, we’ve increasingly seen a number of products claiming to be “next-generation.” This message is now...
Information is powerful. In today’s fast-moving world, timely information is critical to keeping cybersecurity plans and programs current. But, having...