The Brushaloader malware threat, which often loads the Danabot banking trojan, is expanding its target base and refining its tactics.
Enterprise defenders have a very narrow window of opportunity to detect a compromise before attackers spread out through the network and cause more damage. For nation-state attackers, that breakout time is a handful of hours.
There are obvious differences between government policy and organizational policy, but when it comes to crafting information security policies, there are several elements that apply to both sides. Here are some of them.
Speculative execution enhanced microprocessor performance, but also made them more susceptible to side-channel attacks. The final fix won’t be via software updates.
The hack of VFEmail, a hosted email provider, can be a reminder of how disaster recovery planning can be a life saver.