Analysis

Trends and Analysis

Threat intelligence report for the telecommunications industry

 Download PDF Introduction The telecommunications industry keeps the world connected.Telecoms providers build, operate and manage the complex network infrastructures used for voice and data transmission –...

How Machine Learning For Behavior Analytics & Anomaly Detection Speeds Mitigation

By relying on artificial intelligence to identify suspicious network activity or behavior, machine learning can adapt to both business needs and new threats. Businesses and...

Where Cybercriminals Go To Buy Your Stolen Data

What malicious sites provide both free and paid access to stolen credit cards, company databases, malware and more? 1 of 10 Image Source: imsmartin With nothing more...

Malware-Ridden Word Docs Lead To Microsoft Alert Blurt

MICROSOFT HAS taken the trouble to warn Windows users about an attack that takes what trust people have left in the software and throws...

Wildfire, the ransomware threat that takes Holland and Belgium hostage

While ransomware is a global threat, every now and then we see a variant that targets one specific region.For example, the Coinvault malware had...

How Trojans manipulate Google Play

For malware writers, Google Play is the promised land of sorts. Once there, a malicious application gains access to a wide audience, gains the...

Machine Learning In Cybersecurity Warrants A Silver Shotgun Shell Approach

When protecting physical or virtual endpoints, it's vital to have more than one layer of defense against malware. Cybersecurity is arguably the most rapidly evolving...

Introducing Deep Learning: Boosting Cybersecurity With An Artificial Brain

With nearly the same speed and precision that the human eye can identify a water bottle, the technology of deep learning is enabling the...