Hollywood great Woody Allen is the subject used for social engineering by the most recent PE_VIRUT variant discovered by TrendLabs. Make sure you won’t be opening any e-mails or attachments similar to these.
Learn how to protect Enterprises, Small Businesses, and Home Users from ransomware:
Attackers are banking on network vulnerabilities and inherent weaknesses to facilitate massive malware attacks, IoT hacks, and operational disruptions. The ever-shifting threats and increasingly expanding attack surface will challenge users and enterprises to catch up with their security. Read our security predictions for 2018.
Business Process Compromise
Attackers are starting to invest in long-term operations that target specific processes enterprises rely on. They scout for vulnerable practices, susceptible systems and operational loopholes that they can leverage or abuse. To learn more,
read our Security 101: Business Process Compromise.