715 Results for:SPAM
- Sort by:
Types of ransomware and a timeline of attack examples
31 Aug 2023There are eight main types of ransomware but hundreds of examples of ransomware strains. Learn how the ransomware types work, and review notable ransomware attacks and variants. Read More
Exchange Online post-migration steps for admins
20 Jul 2023A move to the hosted email platform is an opportunity to streamline how users work with other Microsoft 365 services. But it requires IT to stay current with the product roadmap. Read More
Exploitation of Barracuda ESG appliances linked to Chinese spies
15 Jun 2023Intelligence from Mandiant links exploitation of a flaw in a subset of Barracuda ESG appliances to a previously untracked China-nexus threat actor Read More
Top 10 types of information security threats for IT teams
29 Jan 2024Know thine enemy -- and the common security threats that can bring an unprepared organization to its knees. Learn what these threats are and how to prevent them. Read More
How Musk's Twitter takeover could affect business accounts
28 Oct 2022Potential changes to Twitter's advertising and security policies are top issues for business owners who rely on the social media platform for brand visibility and sales. Read More
Malware vs. ransomware: What's the difference?
31 Aug 2023Ransomware is a type of malware, or malicious software. While all ransomware is malware, not all malware is ransomware. Read More
Emotet tests new tricks to thwart enhanced security
26 Apr 2022The operators of the Emotet botnet seem to be trying to find a way to get around recent changes made by Microsoft to better protect its users Read More
Top blockchain attacks, hacks and security issues explained
07 Jun 2023Blockchain is an attractive target for malicious actors. From blockchain-specific attacks to human vulnerabilities to lack of regulations, these are the top blockchain issues. Read More
Proofpoint Enterprise Protection: Product overview
30 Dec 2015Expert Karen Scarfone examines the Proofpoint Enterprise Protection email security gateway product, which scans inbound and outbound email messages for malware, phishing and spam threats. Read More
Carrier UCaaS services extend cloud communication benefits
10 Nov 2022UCaaS is becoming more popular as carriers roll out more sophisticated and integrated packages to users. Learn why it might make sense to consolidate your vendors. Read More