Microsoft remains the favorite brand to spoof in phishing campaigns, but more attackers are impersonating Facebook.
How a rocky relationship between IT operations and cybersecurity teams can compound security risks.
Intellectual property and personally identifiable information tie for the type of data IT practitioners are worried about losing.
New tools, such as Compliance Manager and Advanced Message Encryption, aim to give businesses more options for data privacy.
Deep Instinct analysts test three code injection methods and a custom-built Mach-O loader to load malicious files from memory.
Financial services firms saw upticks in credential leaks and credit card compromise as cybercriminals go where the money is.
Security experts point to seven crucial steps companies should be taking as they move data and processes to cloud environments.
Researchers detect a new drive-by download attack in which Google Sites' file cabinet template is a delivery vehicle for malware.
Marcus Hutchins, the security researcher who helped halt the spread of the WannaCry attack, pleads guilty to two charges related to writing malware.