Threat Hunter TeamSymantecPosted: 2 Oct, 20245 Min ReadStonefly: Extortion Attacks Continue Against U.S. TargetsAttacks continue after indictment naming North Korean suspect.Stonefly: Extortion Attacks Continue Against U.S. Targets
Mark KennedyDistinguished Engineer, Security Technology and ResponsePosted: 1 Oct, 20245 Min ReadAdaptive Protection is Put to the TestTests reveal Adaptive Protection blocks potential Living Off the Land attacks 4 seconds fasterAdaptive Protection is Put to the Test
Threat Hunter TeamSymantecPosted: 12 Sep, 20243 Min ReadRansomware: Attacks Once More Nearing Peak LevelsAttacks surge again in second quarter of 2024 as attackers bounce back from disruption.Ransomware: Attacks Once More Nearing Peak Levels
Eduard PalomerasClient Services Consultant IMS Division, BroadcomPosted: 5 Sep, 20245 Min ReadBuilding Identity ResilienceHow will the EU’s Digital Operational Resiliency Act affect identity services? Building Identity Resilience
Yuanjing GuoSoftware EngineerPosted: 27 Aug, 20244 Min ReadUnveiling Mobile App Vulnerabilities: How Popular Apps Leak Sensitive DataA look at eight Android and iOS apps that fail to protect sensitive user data. Unveiling Mobile App Vulnerabilities: How Popular Apps Leak Sensitive Data