Cybercriminals are abusing Twitter via tech support scams, command-and-control (C&C) operations and data exfiltration, with criminals found using fake Twitter accounts to spoof those of legitimate vendors for credible tech support scams.

Published in Security

Cyber security solutions for public cloud and as-a-service grew by 46% year-on-year for the first quarter of the current year, the analyst firm Canalys says.

Published in Security

A bog standard attack aimed at planting a cryptocurrency miner has been found to be using advanced targeted attack tools as well, the security firm Trend Micro says, pointing out that this behaviour marks a departure from the norm.

Published in Security

VENDOR NEWS & EVENTS

REVIEWS

Recent Comments