Discover our blog

Malware - Ransomware

Malware Defense: Protecting Against Metamorphic and Polymorphic Malware

The threat of a cyber-attack is a serious concern for many organizations. Both huge enterprises and smaller SMBs can...

Email Security

Predictive email security for business and SMBs

Cybersecurity and email security for business should be a focus for organizations of all sizes and in all sectors....

Research

Analysis of the wave of PetrWrap/NoPetya/GoldenEye attacks

As of Wednesday June 28, the IT systems of many companies worldwide have been infected by a wave of ransomware...

Phishing

DocuSign Phishing: Data Breach Lead to Malware Phishing Campaign

This week, a data breach at DocuSign lead many customers to become the latest malware victims. Counterfeit emails...

Phishing

Google Doc Phishing: 3rd Party Sharing Features Manipulated

Last week, another major phishing campaign impacted over 1 million Gmail users, taking advantage of legitimate 3rd...

Research

Jaff and Wannacry Ransomware Analysis

Since Thursday, May 11, the media has been preoccupied by an unprecedented series of cyber attacks that have crippled...

Research

NSA Malware: Leaked Code Leaves Millions Vulnerable

In mid-April hacker group, The Shadow Brokers released a package of confidential NSA documents including computer codes...