Please turn on your JavaScript for this page to function normally.
Handshake
OpenText collaborates with Allstate Identity Protection to protect consumers from cyber threats

OpenText has partnered with Allstate Identity Protection (AIP) to offer identity protection services to Webroot customers to further protect consumers from evolving cyber …

Google Play malware
2021 nastiest malware: Here to stay and ever evolving

This year was yet another year with COVID-19 and malware running rampant in the headlines. Be it in person or online, the world is still struggling in the fight against …

Bandura Cyber Intelligence Marketplace deploys cyber intelligence data across network in real-time

Bandura Cyber released “Cyber Intelligence Marketplace,” allowing Bandura Cyber clients to discover, access, acquire, deploy and enforce a curated collection of high quality …

Tony Shadrake joins Beyond Identity as VP of EMEA

Passwordless identity management provider Beyond Identity announced the appointment of its Vice President of EMEA, Tony Shadrake. Tony’s role as the head of the growing EMEA …

Hand
Cybercriminals evolving their tactics to exploit collective human interest

Phishing activity increased significantly in the first few months of 2020, taking advantage of pandemic-induced product shortages and increased usage of streaming services, …

fist
What businesses need to know to evaluate partner cyber resilience

Many recent high-profile breaches have underscored two important cybersecurity lessons: the need for increased scrutiny in evaluating access and controls of partners handling …

ransomware
SMB ransomware extortion: Identifying pieces of the puzzle

2020 saw a new trend emerge: ransomware victims who were unwilling or unable to pay the ransom were faced with the threat of their sensitive information being exposed. Ponying …

drown
2021 will overburden already stressed infosec teams

The year 2020 has given us a contentious U.S. election, a global economic crisis, and most notably a global pandemic. Disinformation has wreaked havoc in our ability to …

lock
How to protect yourself from the hidden threat of evasive scripts

Evasion techniques are used by cybercriminals to evade detection, and they are especially prevalent in the context of scripts, which on their own have legitimate uses (e.g., …

Webroot AI ML
What is the impact of AI and ML tools on cybersecurity?

89% of IT professionals believe their company could be doing more to defend against cyberattacks, with 64% admitting they are not sure what AI/ML means – despite increased …

Windows 7
Researchers observed a 125% increase in malware targeting Windows 7

For the 2020 Webroot Threat Report, researchers analyzed samples from more than 37 billion URLs, 842 million domains, 4 billion IP addresses, 31 million active mobile apps, …

biohazard
The nastiest ransomware, phishing and botnets of 2019

Webroot released its annual Nastiest Malware list, shedding light on 2019’s worst cybersecurity threats. From ransomware strains and cryptomining campaigns that delivered the …

Don't miss

Cybersecurity news