Breaking the attack chain

Breaking the attack chain The attack chain. It’s a term used often in infosecurity. Also known as the kill chain, it was originally used as a military concept to describe the structure of an attack. It serves the same function in cybersecurity, where various methods...

Just Showed Why No One Should Compromise on Security

Bitdefender next-generation machine-learning and memory introspection technologies ensure that Enterprises worldwide have always been safe from the WannaCry ransomware mega-attack and the underlying EternalBlue zero-day exploit CONTEXT On May 12th, the WannaCryptor...

“Your Netflix Membership has been suspended …”

Beware of new FAKE NETFLIX email Netflix customers have received emails that says membership has been suspended, asking them to update their membership information, including credit card number A link the email then sends users to a website that looks very similar to...

Malvertising on iOS pushes eyebrow-raising VPN app

There is a preconceived idea that malvertising mostly affects the Windows platform. Certainly, when it comes to malicious adverts, Internet Explorer is a prime target for malware infections. However, malvertising can produce different outcomes adapted to the device...