eSpeaks host Corey Noles sits down with Qualcomm's Craig Tellalian to explore a workplace computing transformation: the rise of AI-ready PCs. Matt Hillary, VP of Security and CISO at Drata, details ...
The emergence last year of successive, low-volume attacks that struck targeted networks in waves, each containing slightly varied versions of a particular malware, exacerbates the problem and exposes ...
The business of writing, buying, and selling malware has become increasingly commercial over the past few years, but a new report from online security firm Finjan sheds light on just how mainstream ...
While the calendar still indicates that we are in Q1 2014, the security industry continues as a nexus of M&A activity. The year started with FireEye grabbing Mandiant, and proceeded to Bit9’s merger ...
Russian hackers exploit Blender’s Auto Run feature to deliver StealC infostealer via .blend files Malware deployed through CGTrader assets, pulling payloads from Cloudflare Workers domains StealC ...