Archive

Archive

Magecart Hackers Infect 17,000 Sites Through Misconfigured Amazon S3 Buckets

Magecart strikes again! Cybersecurity researchers have identified yet another supply-chain attack carried out by payment card hackers against more than 17,000 web domains, which also include websites in the top 2,000 of Alexa rankings. Since Magecart is neither a single ... »

Study Reveals Phishing Identification and Data Protection Are the Top Problem Areas for End Users

Proofpoint, Inc., (NASDAQ: PFPT), a leading cybersecurity and compliance company, today released its fourth annual Beyond the Phish® report, which examines end user understanding of a broad range of cybersecurity topics and best practices. The report features analysis of data related to nearly ... »

Protect Your Data With Super Easy File Security Tricks!

By: Andy Green Data security is an all-encompassing term. It covers processes and technologies for protecting files, databases, applications, user accounts, servers, network logins, and the network itself. But if you drill down a little in your thinking, it’s easy ... »

The Canadian Bacon Series: Creating a Supported Security Architecture

by: Jason Maynard As security practitioners we pride ourselves on our ability to respond quickly to remediate threats and minimize the impact they have on our business. We all know at some point a breach will happen. But the constant ... »

How to Use Incident Response Reporting to Drive Cyber Security Decisions

In its Q1-2019 Forrester Wave™ report, Forrester Research recognized FireEye as the undisputed industry leader in the Cybersecurity Incident Response Services category. Our unique synthesis of digital forensics, human intelligence (HUMINT) and a global machine learning network generates innovations such ... »