Skip to main content

NEWS & EVENTS

ROKRAT using Twitter, other social media as command and control link

Security researchers at Cisco Talos explain how the ROKRAT malware is leveraging social media to hide its C&C communications in plain sight. Thomas Fischer comments on the story.

Read Now

Case Study: Consolidated DLP and EDR for Internal and External Threats


Pride Cometh Before The Data Leak


nft

What Should Businesses Know About NFTs and IP Protection?


Five Places in San Francisco to Escape the RSA Noise


Verteidigung gegen Zero-Day-Malware


Datasheet: Digital Guardian Enables Secure Office 365


7 Ways to Lose Sensitive Data


chris slupski

Friday Five: Another Cybercrime Market Taken Down, Addressing Open Source Software Security, and Fake Ransomware


Emerson Owes BladeRoom $30M in IP Theft Case