Author: Bert Rankin

A “watering hole attack” is one of many techniques used by cybercriminals to breach an organization’s online information system. Network security administrators should understand how watering hole attacks work, and how to guard against them. Watering hole attacks are neither new or common, but they continually...

One of the applications of advanced threat analytics is protecting people and devices from malicious advertisements. It has become increasingly common for websites, even well-known and trusted ones, to become victims of malicious advertisements or malvertising. When a user visits an infected site, the malicious advertisement...

During the last few months, we’ve been watching an interesting twist in malware analysis. Cybercriminals recently developed a technique where, in some cases, malware can infect a device when the victim simply hovers their mouse over a malicious link. The dangers of clicking on a link...

Malicious email remains one of the most significant and ongoing computer security threats that we face. Cybercriminals use a variety of email-based attacks to deliver malware, lure victims to malicious websites, and steal logon credentials, and organizations everywhere need to understand these threats and how...

Preventing Business Email Compromise is critical for organizations everywhere. Here’s a quick overview of this malicious email-based threat and how to stop it. Sometimes referred to as “whaling” since it specifically targets or impersonates an organization’s biggest fish, in a BEC campaign, the attacker sends an...

One of the most important principles of enterprise security is the rapid detection of a data breach. Unfortunately, many organizations who experience a breach won’t learn about it for months, or even years. In the meantime, today’s fast-paced cyberattacks can cause significant damage to a...

The most important decision a company will make about cybersecurity is its priority. Without support from the very top, an organization’s security staff will never get the resources necessary to adequately protect the company. Unfortunately, the board of directors and C-suite have historically been at...