OPSWAT、FileScan.IO の資産買収を発表. 詳細情報

高度な脅威防止

Why Advanced Persistent Threats Are Targeting the Internet of Things

January 19, 2023
Despite an increased focus on cyber security in recent years, the number of data breaches continues to rise. As enterprises focus more (and spend more) on...

Computer Security Day: 3 Best Practices to Keep Your Data and Devices Safe

November 29, 2022
Today is World Computer Security Day! Founded by the Association for Computing Machinery (ACM) in response to rising cyberthreats, every November 30th the...

What to do about Visual Studio Tools for Office (VSTO) - An alternative to VBA used by cybercriminals

July 27, 2022
VBA (Visual Basic for Applications) macros in Microsoft Office documents have long been abused by threat authors to gain entry to a target system and deploy...

How To Protect Your Network from the New Emotet Attack Abusing LNK File

June 09, 2022 by Ngoc Nguyen
Emotet is considered the most common as well as the most destructive and costly-to-remediate malware currently (1). It primarily spreads through phishing...

BazarBackdoor malware infection using CSV text files – How to prevent it

April 14, 2022 by Ngoc Nguyen
In Feb 2022, malware researcher Chris Campbell spotted a new phishing campaign using specially crafted CSV (comma-separated values) text files to infect users'...

For more information, please contact one of our critical infrastructure cybersecurity experts.

Sign up for Blog updates
Get information and insight from the leaders in advanced threat prevention.