Secrutiny Cyber Security Blog
Get the latest in security advisories, threat commentary and remediation recommendations from information security experts.
Subscribe to our newsletter
A fileless malware campaign is being abused by malicious actors to drop the information stealing Astaroth Trojan into the memory of infected computers.
Intentional or not, insider threats are on the rise. Don’t take the chance; gain a better understanding in our cyber security infographic.
Locking the Door Is No Longer Enough: Required Capabilities for Identity and Access Threat Prevention
In this blog, we will define the key requirements and capabilities of IATP solutions and the drivers they should support within an organisation.
Malicious actors continue to exploit Remote Desktop Protocol (RDP) to gain access to the target computers. Mitigate your exposure now.
Microsoft has officially dropped its 60-day password expiration policy from its security baseline, following May’s Window’s 10 updates.
Microsoft has released fixes for a critical Remote Code Execution vulnerability, CVE-2019-0708, in Remote Desktop Services.