malware
Blog / malware
A live malware infection - a real life study (Part 1)
cybersecurity malware securityWe recently assisted a client that was aggressively hit with a phishing campaign. Following a couple of successful compromises they found themselves faced with an escalation with the malware attempting to impersonate staff, both emailing their customers and pivoting to attack the admin users in a secondary phishing attack. What made things a little more interesting than the usual kiddy attack was that the initial malware was not carrying a particularly nefarious payload, which meant that it escaped the usual malware detection that the client had deployed.
Topics
ai atlassian banking best-practices blockchain ciso climate-change cloud covid19 crime crypto culture customer-success cybersecurity data-protection data-security development dlp employees gdpr infrastructure insider-threat malware office365 offshoring privacy remote-working risk-management robotics security semafore slack social-media technology trojan-horse work-experienceFeatured
AI vs. Web Developers - Collaboration or Competing?
AI vs Web Developers - Collaborative Innovation or Competing Forces in the Future of Web Development? Artificial Intelligence (AI) has come to the for...
Blockchain Technology & the Future of Cybersecurity
Over the past few years, we’ve been hearing more and more about crypto in emerging markets, digital money, blockchain technology, and other financial...