On this #InternationalWomensDay, we celebrate all the brave, talented, determined & visionary women who… https://t.co/Y1K0k59m7P
From the article: Of 255K malicious emails analyzed, our researchers found 100 malware families. Also 1) 70% of ran… https://t.co/T7dcXB1Mai
Threat actors excel at quickly adapting their methods to world events. From Emotet to Ryuk & of course #COVID19, Co… https://t.co/z8CRXaccow
The Phishing Problem with Microsoft Office 365: Attackers are exploiting business use of O365 as #remotework contin… https://t.co/wAjTOZNurV
Heads up on fresh #phishing finds that thwarted secure email gateways. STRRAT was found in environments protected b… https://t.co/G4bwMq4mdy
It takes a human to stop a human cyber attacker. These too common exploits use a human victim to authorize a bogus… https://t.co/36m0HcKnHw
Know when you're being set up & served phish when threat actors cast their nets. Seems like #ItsAlwaysAPhish that g… https://t.co/HHO2NbYJOL
#ICYMI Cybercriminals used Microsoft offerings to create convincing spoofed emails. They used Teams to convince vic… https://t.co/nwUkRspdjQ
Undetected #Malware can cost enterprises far more than dollars. Kill it before it can infect your systems by auto-q… https://t.co/cLPXihrZQl
Our customers are smart & we listen: If your security program is punitive, you'll fail. Network sensors stop attack… https://t.co/UVGEcxYtu1