12 Months of Fighting Cybercrime & Defending Enterprises | SentinelLabs 2021 Review
It’s been a busy year for the SentinelLabs research team, with 45 posts published throughout 2021 on crimeware, APT actors, software
It’s been a busy year for the SentinelLabs research team, with 45 posts published throughout 2021 on crimeware, APT actors, software
Executive Summary A new critical remote code execution vulnerability in Apache Log4j2, a Java-based logging tool, is being tracked as
Executive Summary A new critical remote code execution vulnerability in Apache Log4j2, a Java-based logging tool, is being tracked as
A Guest Post By Daniel Persch, QGroup GmbH, Frankfurt am Main The possibility of leveraging the Web Proxy Auto-Discovery (WPAD) protocol to conduct
In a few short weeks, the global loss attributable to cybercrime is expected to surpass $6 trillion.* Therefore, in an effort to protect financial
In recent years, many companies have learned the hard way that a data breach can have a monumental, negative impact on their brand/reputation,
It’s not that you try to be unsafe online, but it’s easy to get careless when you surf the web. You might log into your bank account online while
The U.S. Securities and Exchange Commission (“SEC”) recently identified cyberthreats as an enforcement priority (see 2021 Examination
DDoS attacks are a cyber threat as simple to put into practice as it is effective: capable of sending a company
Today it’s possible to spy on secret conversations happening in a room from a remote location just by observing a light bulb hanging in there –
In the last two decades, the cases of cyberattacks against Institutions have increased exponentially, so much so that they pose a real threat to the
The organizing committee of the Tokyo2020 Olympics has decided to use the expertise of about 200 ethical hackers to protect their infrastructures
Last December, the EU has released its new Cybersecurity Strategy (EUCSS) to meet an unprecedented surge of cyberattacks due to ongoing
The ongoing exploit of emerging technologies to carry out cyberattacks is not just a matter concerning gangs of hackers and threat actors asking for
Cybersecurity is surely a matter of sophisticated software and technology, but also procedures and proper training are vital to prevent often costly