Secrutiny Cyber Security Blog
Get the latest in security advisories, threat commentary and remediation recommendations from information security experts.
Obsolete software and exposed VPNs come with a host of security vulnerabilities. Understand the dangers and how to secure them in the age of remote work.
74% of breaches involve a privileged account, yet only 3/10 organisations have implemented a PAM solution. Are your privileged accounts at risk?
Domain impersonation is increasingly becoming a problem which targets businesses and their customers. Phishing attackers are now advancing their level of sophistication by utilising domain impersonation as part of BEC scams that can result in CEO fraud, malware infection, or ransom.
Read this blog, including content from our partner KnowBe4, to learn how you can take your employees from liabilities to assets. Including five recommended actions to fortify them into your organisation’s last layer of security.
Password best practice would have us use a separate complex password for everything, but it’s not that easy. Discover our simple route to robust passwords.
With much of the UK working from home due to COVID-19, malicious actors are taking advantage of the pandemic to find opportunities for distributing their malware to unsuspecting users. This blog will give a high-level overview of campaigns and IOCs discovered by Anomali.