The answer to that question still remains open, but we expect it might return in some form or fashion. Yes, the takedown of EMOTET was successful, but anyone in the world of cybersecurity will tell you that malware has a habit of resurfacing in clever and unexpected ways. Therefore, the same could hold true for the EMOTET botnet as well. What is EMOTET? EMOTET, one of the … [Read more...]
WatchGuard Cloud Accelerates the Era of Simplified Security Management for MSPs
Complexity is the enemy of security, and many businesses find that security takes up a disproportionate amount of their IT team’s time. Managed service providers are increasingly filling the security gap allowing their clients to stay safe, while letting them focus on their digital transformation goals. For MSPs transitioning from an IT support services practice, to one that … [Read more...]
Understanding Fileless Malware Outside the Network
Fileless malware has been making headlines over the past year, taking center stage as one of today’s most prominent threat categories. According to Cisco, fileless attacks were the most common threat targeting endpoints in the first half of 2020. To prevent this type of malware effectively, organizations need to establish a deep understanding of how it works in … [Read more...]
SolarWinds Supply Chain Hack Responsible for FireEye Breach
Last week, the cybersecurity consulting company FireEye announced they had suffered a breach where attackers stole sensitive “red team” hacking tools and potentially information related to certain government customers. FireEye has historically been one of if not the most prominent consultants brought in to investigate attacks against large organizations and government entities. … [Read more...]
Tackling 2021 Security Planning and Budgeting
Annual planning and budgeting has always been a critical, albeit potentially cumbersome aspect of establishing a successful security posture. Information security doesn’t contribute directly to the bottom line for most companies and management often views it as a cost. That’s why it’s essential for CISO and security leaders to allocate the budget they do get as effectively as … [Read more...]