article thumbnail

Microsoft Office 365: This new feature will keep you safe from malware-filled documents

Tech Republic Security

Application Guard for Office and Safe Documents will make phishing attacks harder and the Office experience better for users, starting with Office 365 Pro Plus and E5 licences.

Malware 192
article thumbnail

Dell Data Protection Protected Workspace & Malware Prevention

CTOvision

The video below explores DDP Protected Workspace and uniquely addresses healthcare regulations related to malware prevention. Individuals take malware and obtain the characteristics pertaining to the individual and find ways to get around the malware inspections in place. The malware is from external agents.

Malware 259
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Top 10 Malware Strains of 2021

SecureWorld News

Cybersecurity and Infrastructure Security Agency (CISA) and the Australian Cyber Security Centre (ACSC) released a joint Cybersecurity Advisory (CSA) providing details on the top malware strains of 2021. The top malware strains in 2021 included remote access Trojans (RATs), banking Trojans, information stealers, and ransomware.

Malware 85
article thumbnail

Rombertik: Old Dog

Doctor Chaos

I recently came across a classic malware which I thought was long gone and forgotten. Rombertik is a self-destructing malware that has been making a lot of news. This malware leverages vulnerabilities through a Web browser’s operation of collecting user data from sites being visited by the victim. What We Learned.

Malware 130
article thumbnail

Center for Internet Security: 18 security controls you need

Network World

The Center for Internet Security has updated its set of safeguards for warding off the five most common types of attacks facing enterprise networks—web-application hacking, insider and privilege misuse, malware, ransomware, and targeted intrusions. To read this article in full, please click here

Internet 158
article thumbnail

What is fileless malware and how do you protect against it?

CTOvision

Read Mary Branscombe explain the nature of fileless malware and what you can do to protect against it on Tech Republic : When you get tricked by a phishing mail and open a document attachment that has a malicious macro or a link to a malicious site, or you download an infected application, there’s a […].

Malware 36
article thumbnail

FBI Cripples 20-Year Russian Cyber Espionage Campaign

SecureWorld News

The FBI operation, codenamed "Medusa," targeted malware deployed by Moscow's Federal Security Service (FSB), which was used to target a wide range of U.S. The FBI used Perseus to issue commands to Snake, causing it to overwrite its own vital components without affecting the host computer or other legitimate applications on that computer.

Malware 71