top threats Archives - Calyptix Security top threats Archives - Calyptix Security
Tag archive for : top threats
Tag archive for : top threats

Top 10 Security Vulnerabilities of 2017

top-10-vulnerabilities-of-2017---1

New vulnerabilities are discovered every week – some silly and some severe. Knowing which are the most dangerous depends on several factors, including the popularity of the flaw among data thieves.

See the top 10 vulnerabilities in exploit kits in 2017. We list and describe each security flaw and also explain why Adobe products no longer dominate the top 10.

Continue reading

Filed under : Top threats
Author : Calyptix
Comment Number : No Comment Yet
Tagged on : top threats

VPNFilter: 500,000 Infected and Worse Than Reported

VPNFilter-router-attack-1

A nasty strain of malware has infected hundreds of thousands of routers – and it’s worse than initially thought.

Called VPNFilter, the malware allows attackers to monitor traffic, steal login credentials, brick the device, and even inject malicious JavaScript into users’ web sessions.

See who is vulnerable to VPNFilter, how it works, and who might be responsible for launching it.

Continue reading

Filed under : Top threats
Author : Calyptix
Comment Number : No Comment Yet
Tagged on : top threats

Top Causes of Data Breaches by Industry 2018: Verizon DBIR

verizon-data-breach

Most IT firms have clients from a range of industries. That means you encounter a wide range of security threats. How do you know which threats are the most important to focus on?

Check out the leading causes of data breaches across eight sectors. You’ll see attack trends in retail, healthcare, finance, government, and more – and even a few surprises.

Continue reading

Filed under : Top threats
Author : Calyptix
Comment Number : No Comment Yet
Tagged on : top threats

Fileless Malware: How it Steals in Plain Sight

Fileless Malware 1

Some malware can hide in plain sight – injecting itself into RAM and active processes. This makes it almost impossible to detect with traditional antivirus.

Get an overview of “fileless malware”, how it works, and how it can takeover. You’ll also see examples of recent fileless attacks against restaurants, website visitors, and more.

Continue reading

Filed under : Top threats
Author : Calyptix
Comment Number : No Comment Yet
Tagged on : top threats
Page 1 From 5